Sniffer Packets & Firewalls By Kay Hearn BA, Grad Dip Journalism ...

223
Sniffer Packets & Firewalls By Kay Hearn BA, Grad Dip Journalism Murdoch University W.A. A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Communication University of Canberra June 2008 ©

Transcript of Sniffer Packets & Firewalls By Kay Hearn BA, Grad Dip Journalism ...

Sniffer Packets & Firewalls

By

Kay Hearn BA, Grad Dip Journalism

Murdoch University W.A.

A thesis submitted in fulfilment of the requirements for the degree of

Doctor of Philosophy Communication

University of Canberra

June 2008

©

Sniffer Packets & Firewalls 2

Abstract

Falun Gong protesters, the bombing of the Chinese Embassy in Belgrade, the spy plane incident and a series of mine accidents are just some of the events over the past decade that involved the Internet. In each incident the leadership of the Chinese Communist Party (CCP) was caught off guard by the circumvention of informational flows as a consequence of the Internet. This is in some ways indicative of the impact the medium is having on the ability of the CCP to manage political discourse within the confines of the country. This thesis examines the way that political discourse in contemporary China is managed in response to the development of the Internet, using the concepts of time and space as conceived by Harold A. Innis.

This historical study considers the strategies used in the management of time and space in the Peoples Republic of China (PRC) across a broad range of ways in which the medium is used by particular groups, such as online gamers, bloggers, hackers, and activists. I have also looked at the way information flows are managed during a crisis or disaster using critical textual analysis of Internet sources, and specific examples. These sources are both official and unofficial including Chinese government sites, journalistic sources both Chinese and Western and Chinese legal databases that appear on the World Wide Web (WWW). The study finds that there is an emerging shift from propaganda based media manipulation and suppression to a style of stage managed spin. The CCP have used three strategies to contain and maintain their hold over central power, including the rule of law, investment in the development of content and technological means. The development of the Internet in China is marked by a dialect of desire for the technology for economic purposes and the perceived need to control the technology for political purposes. The Internet has also enabled the central government in Beijing to reassert its position as a central authority over local and provincial governments.

This study contributes to the existing knowledge about Chinese media policy and the Internet, and will shed light on the ways in which the tehcnology influences the production and consumption of media and the impact that the development of this medium has upon media policy in China. Furthermore, this study will contribute to a greater understanding of CCP’s ability to manage information and the impact that this medium will have on the operations of Chinese politics within the space of the Internet, as well as the impact of the technology on politics, and China’s interaction with the international community.

Sniffer Packets & Firewalls 3

Acknowledgements

I wish to express my sincere appreciation to Dr Ann Willis for her assistance in the preparation of this manuscript. Thanks also to the members of the faculty for their valuable input.

In addition I would also like to thank my family for their support whilst writing this thesis, and to especially thank my son Jack Lowrie for his advice on the chapter on online games. Also my husband Ian Lowrie for his constant encouragement.

Finally, I wish to acknowledge the efforts of Ann Beveridge and Taryn Miller for their support and editing expertise.

Sniffer Packets & Firewalls 4

Table of Contents

Part I

Chapter 1

Introduction 7 Old and New Media 7

The Democratising Potential of the Internet 10China and the Management of Informational Flows 12Purpose of the study 15Time and Space 17Habermas 18 Methodology 19The Development of the Net 21Literature Review 22The Internet in China 22The Public 26Globalization 27The Internet 28The Layout 30The Media 30Modes of Censorship 30NGOs 31Hacking 31Disasters & Starbucks 32The Blogosphere 33Online Games 33Conclusion 33

Chapter 2

Theoretical framework 34 Medium Theory 34

Chapter 3

The Media in China 41Policy 42The Impact of the Market or Socialism with Chinese Characteristics 44Conclusion 45

Chapter 4

Building and Censoring the Great Firewall 47The Politics of Control 49Filtering: Technical means of Censorship 52Regulations 56

Sniffer Packets & Firewalls 5

Internet Cafes 58The Internet Police and Other Hit Squads 59The Development of Content 61Breaking through the Great Firewall 64Conclusion 66

Part II

Chapter 5

Official/Unofficial: The Management of Non Government Organisations 67Civil Society and the Public Sphere 67Small Government Big Society 74NGOs Environmental Groups 76Green Riots and Unofficial Discourse 77HIV/AIDS 84Conclusion 91

Chapter 6

Hacking: Circumnavigating the great firewall 93Legal Framework 95Military & Cyber warfare 96Taiwan 102Tibet 104Unofficial Nationalism & Hacking for the Nation 106Nationalism & Hacking 107Hactivism & Democracy 110Conclusion 112

Chapter 7Disasters & Starbucks 114Jianxi School Explosion 116Starbucks 117The Black Kiln Scandal 119Workers Rights 124History Revisited the Karamay Fire 127Conclusion 128

Chapter 8The Management Of China’s Blogosphere 129Promotion Tinged With Fear 131Regulations 134A Nail House in Chongqing and the Birth of Citizen Journalism 136Regulating Code 143Microsoft 144Conclusion 149

Sniffer Packets & Firewalls 6

Chapter 9Lei Feng Lives on in Cyberspace 150Regulations 154 Direct Investment & The Shaping Of Content 156Propaganda 159Nationalism 161Online Protests and Nationalism 162Wow With Chinese Characteristics 167Conclusion 172

Part III

Chapter 10

Conclusion 172

Bibliography 182Abbreviations 198Appendix I 199Appendix II 205Appendix III 206Appendix IV 208Appendix V 210Appendix VI 214Appendix VII 215

Sniffer Packets & Firewalls 7

C h a p t e r 1

Introduction:

The number of Internet users in the People’s Republic of China (PRC) reached 210

million ((CNNIC), 2008) as of June 2008, making it the largest national population on

the Internet. The technology has been hailed as a democratising force and that is

facilitating the emergence of a new form of publicsphere. It is my contention however

that the development of the Internet in China is marked by a dialect of desire and

control; a desire for the technology of for its economic benefits and the perceived

need to control the technology for the political purposes of the CCP (Communist

Party of China). The strategies used by the CCP to manage the technology of the

Internet include legislation, the development of content and technological means, and

by this I mean the code used to construct the architecture of the Internet. The

development of the Internet has also enabled the leadership of the CCP in Beijing to

assert central authority over the local and provincial governments at the margins.

Therefore the technology is not inherently democratic and is not leading to the

formation of Habermas’s notion of a public sphere and democratization.

Old and New Media Environments

The Internet remains a rapidly evolving networked digital media environment which

cannot be simply defined as a form of ‘new media’. Such a definition ignores what

constitutes this environment that has stemmed from the convergence of ‘traditional’

(analogue) media to ‘new’ (digital) media. Further, and importantly, as a media

environment, the Internet contains all the components of historical modes of

communication including the spoken word, the image (moving and still), sound and

text. The new digital interactive modes of communication form a vast archive of

commercial and non-commercial information, where advertising, government, non-

Government organisations (NGOs), entertainment, pornography and games, to name

but a few, coalesce. In addition to this boundless form of content is the speed at which

information is produced and sent and consumed via these networks across the planet.

The architecture of the Internet is decentralised, re-routable, non-hierarchical and now

comprises a multitude of networks, intranets, and Sub-Webs. The history of the

Sniffer Packets & Firewalls 8

Internet is well documented: in short, the Internet was originally designed by the

United States of America for military purposes so there could be no central command

post. Thus in the event of an ‘attack’ communications could be re-routed to other

sites. Internet access, in combination with promotion for its use via both

‘underground users’ and commercial industries synergetically incorporating the work

and personal computer, leads to the creation of socio/political and economic utopian

and dystopian discourses regarding potential communications possibilities and

ramifications (Barlow, 1996; Goldsmith & Wu, 2006a; Kalathil & Boas, 2003). A

predominant utopian discourse created by commerce, governments and citizens was

that as a decentralised communications tool, the Internet via human agency had the

potential to deliver democracy to the most totalitarian countries, and also perhaps lead

to the rebirth of ‘the media as fourth estate’ or ‘public watchdog’1 with a twist - via

activities such as citizen journalism whereby individuals or groups could disperse

information not being released by government or reported by the traditional news

sources. Flew also argues that “…citizen journalism can in a sense be defined by

some of its more conspicuous examples…” (Flew, 2008, p.143). Some examples Flew

uses include Crikey, New Matilda and On Line Opinion in Australia. The Drudge

Report in the USA and sites such as OhMyNews in South Korea, and the

malysiakini.com site in Malaysia. These sites have previously broken stories that were

later picked up by the mass media or they have served as focal points for political

activism. The Drudge Report site, based in North America, first broke the news of the

Bill Clinton/Monica Lewinsky scandal, which then made the mainstream news in

North America only after journalists hit the ‘Drudge’ site first for information. An

example of this from the PRC is the blog run by Zola, dubbed the first ‘citizen

journalist’, a vegetable seller who travelled the country covering stories that were not

being touched by mainstream Chinese media. Zola’s story is covered in detail in

chapter eight. The point here is that these sites share a commonality in that they

represent both an emergent form of ‘new media’ and public opinion. These new

forms, be they collective in views or based on personal opinion, are not (in general)

1 “Traditionalist liberal thought argues that the primary democratic role of the media is to act as a public watchdog overseeing the state. This is usually defined as revealing abuses in the exercise of state authority, although it is sometimes extended to include facilitating a general debate about the functioning of government. The watchdog role is said to override the importance of all other functions of the media, and to dictate the form in which the media should be organized…Once the media becomes subject to public regulation will it lose its bite a watchdog and may be transformed into a snarling Rottweiler in the service of the state” (Curren & Gurevitch, 1991, pp. 82-117)

Sniffer Packets & Firewalls 9

subject to state media regulations and protocol. In addition, they also again carry

traces of the ‘…bourgeois public sphere’… (Curren & Gurevitch, 1991, p.84) because

not all the ‘public’ can participate in such modes of ‘new media’ citizen

opinion/journalism due to affordability and new media literacy skills.

In this sense, elements of ‘new media’ citizen journalism hark back to Jurgen

Habermas’s concept of the public sphere that argues:

The development of early modern capitalism brought into being an autonomous arena of public debate. The economic independence provided by private property, the critical reflection fostered by letters and novels, the flowering of discussions in coffee houses and salons and, above all, the emergence of an independent, market-based press, created a new public [sphere] engaged in critical discussion. From this was forged a reason-based consensus which shaped the direction of the state (Curren & Gurevitch, 1991, p.84).

It was the creation and formation of new spaces of public debate that Habermas

identified as the public sphere. Curren and Gurevitch (1991, p. 84) argue that:

Habermas traces the evolution of the ‘bourgeois public sphere’ - a public space between the economy and the state in which public opinion was formed and ‘popular’ supervision of government was established - from the seventeenth to the first half of the of the nineteenth century. Thereafter, he argues, the public sphere came to be dominated by an expanded state and organized economic interests. A new corporatist pattern of power relations were established in which organized interests bargained with each other and the state, while increasingly excluding the public.

In general, the “…fostering of a new public [sphere] engaged in critical discussion…”

(Curren & Gurevitch, 1991, p. 84) unsurprisingly became re-established and re-

narrativised into the new media utopian discourse of the late 1980s and early 1990s,

largely for commercial and political reasons. It fuelled the concept of the ‘democratic’

potential of new media, particularly the democratic potential of the Internet discourse

that could act as a conduit, providing ideal virtual interactive public discussion and

debate forums akin to seventeenth century face–to-face ‘town hall’ meetings

regarding community/politics/socio economic matters. In short, this utopian discourse

is pertinent to my thesis in that it considers the Internet has the potential to provide

people/citizens with both a ‘voice’ and the ability to connect with others regardless of

Sniffer Packets & Firewalls 10

spatial issues, national boundaries and government regulations and restrictions. This

thesis rejects the utopian position and agues that while the Internet has enabled

Chinese citizens to achieve a higher level of engagement with one another and the rest

of the world, there are still clearly defined limits to that participation in public life and

those limits are set by the CCP.

Another pertinent theme of my thesis argument that is unavoidably connected to the

techno-utopian discourse is argument regarding new media technology. The provision

of the production of content and speed of access accorded to digital technology allows

an infinite array of information to be dispersed. In what is construed as an

‘uncontrollable’ new media environment there are numerous regulatory issues and

problems for governments, primarily because the new media environment directly

challenges the ability to manage flows of information, particularly ‘unoffically

sanctioned’ socio-political information. This aspect means that users who have access

to the Internet can exacerbate the government problematics of information

management and media flow. In conclusion, creating strategies to manage media

information flows by governments in an era of digital technological convergence is,

as stated at the beginning of this chapter, in its infancy. The primary focus of this

thesis is to analyses the PRC’s government strategies to manage the flow of media

information. The CCP efforts to manage the Internet have largely been successful in

reinforcing their position as the central authority of the country.

The Democratising Potential of the Internet

It is a myth that the Internet is somehow inherently democratic, and though this myth

is no longer plausible it is persistent. Jack Goldsmith and Tim Wu (2006a, p.14)

write:

… it was widely believed that cyberspace might challenge the authority of nation-states and move to a new, post territorial system. Today, notions of a self governing cyberspace are largely discredited. But the historical significance of these ideas cannot be ignored. They had an enormous impact on Internet writers and thinkers firms, and even the US Supreme Court- an influence that is still with us today.

Sniffer Packets & Firewalls 11

The myth that the Internet will deliver a western democratic model has been very

persistent, particularly in regards to authoritarian states such as China. Catharin

Dalpino argues that displays of ‘people power’ have immense influence on the

American public and the view of civil society as a means of change influences US

policy towards authoritarian regimes (Dalpino, 2000, p.52). On the contrary Shanthi

Kalathil and Taylor C. Boas “argue that the Internet is not inherently a threat to

authoritarian rule. Rather than sounding the death knell for authoritarianism the

global diffusion of the Internet presents both opportunity and challenge for

authoritarian regimes” (Kalathil & Boas, 2003, p.136).

James Boyle also looks at the myth that the Internet is somehow free and open and

that it would be resistant to regulation by the state. Boyle (1997, n.p.) argues that:

It was not so much that nation states would not want to regulate the Net, it was that they would be unable to do so; forestalled by the technology of the medium, the geographical distribution of its users and the nature of its content. This tripartite immunity came to be a kind of Internet Holy Trinity, faith in it was a condition of acceptance into the community

In fact the Internet is subject to human agency like any other form of technology and

there are several ways in which management and power are exercised over it.

Primarily this is done through legislation and the technology itself. Legislation is used

first and foremost to manage what can appear, while the code and the architecture can

be used to manage informational flows technologically, and this is done in China,

Europe, Australia, USA and elsewhere.

At this point it is important to emphasise the idea that the flow of information is

managed rather than controlled, because realistically it is well known that information

in the environment of the Internet cannot be totally controlled. In the west, the

business Public Relations (PR) model of spin is knowingly applied by governments

and individuals to manage information and perceptions. The distinction between

control and management is the difference between direct force and coercion through

social, political and legal means. Control implies total power and management means

that power is maintained through specific mechanisms. Thinking about the

management of the flow of information rather than total control of that flow

Sniffer Packets & Firewalls 12

recognises that there are attempts to control the flow of information and that this will

not always be successful. In China, where information has been subject to tight

control and suppression there is, I would argue, an emerging understanding that

information management and spin is more likely to succeed than suppression. To take

the position that information can be completely controlled is naïve at best. Most

governments have realised this and so seek to contain the impact and consequences of

the technology largely through legislation, and some countries additionally attempt to

manage informational flows on the Internet through technological means. All

countries that are connected to the WWW are, in some way or another, attempting to

manage the flow of information based on a wide variety of socio-political legal and

ideological reasons.2

Civil libertarians in the West are constantly arguing that governments are eroding our

privacy, and that the technology has the potential for surveillance of its citizens. The

difference is the terms used by western governments to justify the implementation of

policies and technology that enhance the surveillance aspects of the Internet. The

surveillance aspects of the Internet have been likened to George Orwell’s tele-screen

in the novel 1984 which acts as a giant panopticon in which networks can be used for

the surveillance of private citizens. Users leave electronic fingerprints where ever they

go, through cookies3 placed in a computer by a website that can track which site the

user has visited, to the records that are left on server computers operated by Internet

Providers. James Boyle has looked at the potential for surveillance that the Internet

represents, and using Foucault and his mediation of Jeremy Bentham’s panopticon

prison he argues that the Internet is a decentralised collection of privately owned

panopticons. Boyle writes that “the position is less clear if that information is

guarded by digital fences which themselves are backed by a state power maintained

through private systems of surveillance and control” (Boyle, 1997, n.p.). The utopian

2 In Germany it is Neo Nazis, in Australia it is Online gambling, and in the USA a lot has been made of the way that the Net can be used to catch terrorists, and in each case the justification is the same; national security and public safety. A specific example would be in the United States following the events of September 11 the government there introduced the Patriot Act, which allows for electronic surveillance.3 A cookie is a small parcel of text used to differentiate users and authenticate information when a users revisits a website. Cookies can also be used to track information about users.

Sniffer Packets & Firewalls 13

idea of the Internet as democratising force begins to appear a little tarnished in light of

Boyle’s analysis.

China and the Management of Informational Flows

The perception that Chinese authorities are ‘heavy-handed’ in their attempts to control

the Internet seems to confirm the old command-submission model of Chinese media

theory (W. Sun, 1996) that has informed much of the West’s analysis of the Chinese

media since 1949. This is a literal interpretation of the media as the mouthpiece of

the Chinese Communist Party (CCP) and the way that the media is hierarchically

organized, with Beijing news organizations at the center that dictate policy to the

subservient margins.

The situation is much more complex than is implied by the simple command

submission model, a situation where according to an old Chinese proverb ‘you need to

kill the rooster to frighten the monkey’ (杀鸡儆猴), in other words sometimes you

need to make an example of someone. In this scenario the centre is all powerful and

demands passive submission by citizens and provincial governments at the margins. A

number of factors need to be taken into account in order to grasp the challenge the

Internet presents to the current closed and authoritarian political regime in China.

These include the manner in which elite politics is organized in Beijing, the tensions

inherent in superimposing a market driven economic model on a command driven

culture, the regulatory regime that emerges from these tensions, the regional

disparities that currently inform Chinese society and the role of Western firms in

providing software and infrastructure to China.

It is important at this point to make a clear distinction between management and

control. Control implies that the CCP or rather the Central Committee of the CCP has

all the power and all the authority to impose their will over the flow of information

and the Internet as well as control over China’s citizens. Historically, such citizen and

media control may have been largely attainable, but this is just not possible, and the

CCP is well aware of this. The notion of management rather than of control needs to

be applied to both informational flows as well as to the way in which the media and

politics operate in China in general. With this in mind it is my contention that the

Sniffer Packets & Firewalls 14

CCP seek to maintain the dominant voice in all spheres of influence, and in the ways

in which they are mediated, but they are learning to do this via management rather

than total ‘control’ and suppression.

To argue the CCP still seeks total control is to continue to buy into the top down

interpretation of the way in which the media and indeed the CCP operate, and this is

not the case. The ongoing wave of crackdowns and relaxation on the flow of

information and the visible attempts to control the Internet is generally in response to

an event or events that are beyond the control of the CCP. In addition crackdowns

coincide with important dates such as the recent leadership meetings. For example

there was a widespread crackdown on the Internet in China prior to the 16th Party

Congress at which Jiang stepped down and appointed his anointed successor Hu

Jintao. Instances like this are examples of the CCP seeking to maintain its position as

the dominant voice over the issue using traditional modes. More often the CCP seeks

to contain informational flows bordered by the parameters they set. Realistically this

is limiting what can be said rather than controlling the information. So it is better to

think of this as managing the flow of information rather than an out and out attempt to

control it, and this is more consistent with notions of Public Relations spin used in the

west.

Anne-Marie Brady4 asserts that Western PR techniques and advertising methods were

first introduced in the 1980’s, but were not really taken on until the early 1990’s.

Brady contends that, “Propaganda work is playing a central role in the repackaging of

the CCP. Propaganda - publicising the government’s activities and educating the

population – has always been an essential element of the CCP hold on power” (Brady,

2006, p. 58). She argues that since the 1990’s the CCP “has focused on the goals of

uniting public opinion in China, strengthening government power, and improving

both the party and the military’s image” (Brady, 2006, p. 58). The theme of unifying

public opinion behind the CCP underlies their response to many of the examples used

in this thesis, for example, the spy plane incident and the embassy bombing in

Belgrade. This was also a feature of the handling of the Black Kiln Incident in chapter

seven and the nailhouse in chapter eight.

4 Brady provides excellent background on adoption of PR practices as a part of modernizing propaganda in China.

Sniffer Packets & Firewalls 15

Events that occur outside of the government have often ended in either a crackdown

on the Internet, such as the Falun Gong demonstrations of 1999, or a reason to clean-

up corruption, as in the case of the Nandan mine disaster in 2002. Access to the

Internet is also being used to exhibit the willingness of the CCP to participate in

global affairs, for example the availability of CNN during the APEC meeting in

October 2001. The cycle of crackdown and relaxation on information flows is a part

of the way in which the CCP manages the country and this cycle highlights the

tensions inherent in the reform process.

The provision of the Internet and the interactive forms of communication that are now

available to Chinese citizens has also created a new window through which public

opinion can be viewed. In recent years the government has also sought public opinion

through the Internet, such as in 2007 when the government were making changes to

the public holiday system ("Support for new holiday plan may depend on wording of

polls," 2007, n.p.), and when opinion was sought on a draft for a self-discipline code

for blog services ("China eases off proposal for real-name registration of bloggers,"

2007, n.p.).

The CCP is caught in a bind over the paradox of the desire for the infrastructure for

economic development and the perceived need to manage the flow of information for

political purposes. Tan, Foster and Gordon argue “there is evidence of a positive

correlation between telecommunications infrastructure and economic growth around

the world” (Tan, Foster, & Gordon, 1999, p.45). Information infrastructure also

facilitates economic growth. The CCP views the ability to manage information as

essential to its ability to govern the country, as the party has limited mechanisms for

dealing with any form of dissent and seeks to confine debate within certain

parameters. As David S. Goodman points out “the CCP is the framework for all

political activity” (Goodman & Hooper, 1994, p.13). Thus the CCP is the only

channel for political activity, and it must negotiate a successful way to retain this

control within the context of new media and technologically educated society. Thus

the Internet in the PRC has been developed in consistiency with the notion that the

CCP is the only framework for political activity.

Sniffer Packets & Firewalls 16

Purpose of the Study

The Internet is often regarded as uncontrollable and therefore presenting a major

threat to authoritarian states such as the People’s Republic of China (PRC). Much has

been made of the CCP’s attempts to control what appears to be uncontrollable and this

has fuelled the myth that the Internet will inevitably deliver democracy to countries

like the PRC. In the case of China several works have emerged linking the

inevitability of democracy to Habermas’s concept of the public sphere and this is

discussed in more depth in chapter 5. Though it must be acknowledged that the

introduction of the Internet has enabled Chinese citizen’s broader engagement with

one another and with the rest of the world, there are still clearly defined limits to

public life within the space of the Internet and that those limits are defined by the

CCP. The aim of this thesis is to dispel the myth that the Internet is somehow

inherently democratic and to explore the methods used by the CCP to manage and to

shape Chinese political discourse as a consequence of the development of this

seemingly unmanageable online media environment in relation to information

dissemination and human agency. In order to do this I have looked at specific

historical events which serve as examples of the strategies utilized by the CCP to

adapt to the new media/online environment. The examples that I have used also

underscore the dichotomy of the desire by Chinese authorities for the development of

the technology for its economic benefits and the desire to want to ‘control’ the

technology for political purposes. Primarily this thesis looks at the way in which the

CCP has responded to certain incidents where private citizens have been able to

circumvent traditional information flows via the Internet and the CCP’s framework

for political discourse, and the relationship these events have with the management of

information. It is about the adaptation of the CCP to a changing media environment as

a result of the development of the Internet. This thesis rejects claims that the Internet

is inherently free and will lead the PRC down a direct path to democracy. It is my

contention that the strategies utilized to maintain the CCP position as the central

authority of political power in the PRC include legislation, investment in the

development of content and the code used to construct the Internet itself. I have

sought out examples where there are clear contradictions highlighting the degree to

which the Internet can be ‘controlled’ when there is the will to do so. The use of

these strategies indicates a shift by the CCP from the suppression of information to

Sniffer Packets & Firewalls 17

the management of information. I have also used examples where Chinese citizens

have been determined to tell their stories and directly challenge government decisions.

These examples serve as my empirical evidence.

The case studies also highlight centre margin relationships between the leadership of

the CCP in Beijing at the centre and provincial authorities and citizens at the margins

as they are played out in the media and via the Internet through the events crises and

dissent that is expressed in the forums that are present in this space. Thus the case

studies often shed light on the way in which Beijing at the centre has reinforced its

position of authority over provincial governments at the margins. The core/periphery

analysis highlighted by the cases studies is informed by the work of Harold A. Innis

and his conception of the relationship between communications technologies and the

management of time and space.

Time and Space

The theoretical framework used for this thesis is medium theory, in particular the

ideas of Harold Innis, and this is dealt with in depth in chapter two. The core of

Innis’s concepts of time and space can be found in Empire and Communications

(1972) in which he traces the history of communications from ancient Egypt to the

printing press, and in the collection of essays The Bias of Communication (1951).

These works form the basis of the theoretical framework for this project. In these

essays Innis argues that power and influence are derived through the formation of

monopolies of knowledge that are built up and exerted over time and space via

communications technologies. In Innis’s theory, communications technology is used

to construct a particular reality that is reflective of its monopoly of knowledge. There

are also similarities to Marx’s conception of time in the modern era, in that Innis’s

conception of time is also tied to the idea of the commodification of time in all its

manifestations and in modern communications technologies and the tendency towards

monopoly.

Spatially oriented communities, in Innis’s terms, are similar to Benedict Anderson’s

(1993) imagined communities. Both Anderson and Innis draw on the varying concepts

of time to argue that history is used in the organization of space. In Imagined

Sniffer Packets & Firewalls 18

Communities: Reflections on the Origins and Spread of Nationalism (1993),

Anderson argues that the nation-state is a community imagined through literature,

poetry, music and print capitalism and the rituals of official nationalism as articulated

by the state. Anderson’s concept of imagined communities was useful in my tracking

of the management of the online game sector of the Chinese Internet. Many of the

games that have been developed for the Chinese market emphasise the ideology of

‘socialism with Chinese characteristics’ and this is discussed in chapter nine.

Anderson’s work was also pertinent when looking at the way that hacking has been

managed and this is discussed in chapter six. Anderson is more concerned with the

process of identity construction rather than power relationships that arise out of the

consequences of the creation of space communities and nation states, and the tensions

that are embedded therein through coalitions of vast regional differences. The

theoretical framework is discussed in more detail in chapter 2.

Habermas

The use of Habermas’s concept of the civil society and the public sphere has been

used by a number of scholars to look at the development of the Internet in China

(Hartford, 2000; Kalathil & Boas, 2003; Tai, 2006; X. Wu, 2006; Yang, 2003a,

2003b; Yang & Calhoun, 2007; Zheng, 2008; Yongming Zhou, 2006). The argument

here is that the Internet has the potential to transform China’s political culture from

the bottom up as people congregate in the space of the Internet and possibly

influencing the government. This concept is outlined in more detail in chapter 5. This

thesis contends that Habermas’s concept of civil society has a number of

shortcomings when related to the Internet in China, for instance the way that it

diffuses attention away from unequal power relationships that are inherent in all

political interactions, whether these groups are able to influence the government or

not5. It overstates the role that groups outside the government have in influencing the

government and political decisions at this stage, and is inadequate for understanding

the internal politics of the CCP and the government. The situation is much more

complex when tensions between the central and provincial governments and internal

bureaucratic machinations are taken into consideration.

5 This is discussed in much more depth in chapter 5.

Sniffer Packets & Firewalls 19

The concept of civil society also overlooks the restrictions and regulations that are

placed on the formation of associations, particularly in the case of authoritarian

countries such as China. Shanthi Kalathil and Taylor C. Boas point out that civil

society organisations in scores of authoritarian countries are weak as a consequence of

state activities aimed at dominating the political culture within these countries

(Kalathil & Boas, 2003, p.144). Kalathil and Boas also say that “Internet use is more

common among civil society organisations that are not necessarily opposed to the

regime that governs their country” (Kalathil & Boas, 2003, p.144).

My own position is more closely aligned with that of Kalathil (2003, p. 490) who

argues that “ultimately, the Chinese government is attempting to mould the Internet

business sector under the strategy it has devised for Internet development in general:

allowing a degree of liberalization while making sure to set the broad rules of the

game”. I seek to extend this argument by including other strategies employed by the

CCP, in particular the strategies of the development of content, and the use of code to

create the architecture of the Internet itself. I also aim to contextualise the impact of

these strategies on some of the uses of the Internet such as blogs, online games, and

hacking, as well as the use of the Internet in official and unofficial civic participation.

What distinguishes this study on the Internet in China from other studies, is the

theoretical framework, a broad focus on the identified strategies of management and

the impact these strategies have had on the development of particular types of content

such as games and blogs, as well as the ways in which the medium has been used by

bloggers, gamers and hackers and the changing way in which official and unofficial

discourse are managed as a consequence of the development of the technology. My

aim is to look at the way that the Internet as it is viewed in Mainland China is shaped

by the CCP and how resistance is articulated and silenced or incorporated into

existing discourses. More broadly the Internet only empowers certain groups within

society because it suits the CCP. When an event occurs that can be used by to advance

a particular line then the Internet is allowed to empower society. When an event runs

contrary to the CCP line, such as the riots in Lhasa Tibet in 2008, there is a

crackdown and a public relations/propaganda offensive follows. Thus content

development is a key feature of the overall management strategy; to ‘control’ the

Internet through careful management.

Sniffer Packets & Firewalls 20

Methodology

The method employed was a critical textual analysis of the English language versions

of news articles that reported these events in both the Chinese and Western media.

Many of the primary sources for this thesis came from official Chinese media

websites such as the Peoples Daily Online, Xinhua (the official Chinese News

Agency), the China Daily, and China.org.cn, a news portal run by the China Internet

Information Centre under the State Council Information Office, the highest

administrative authority in the PRC. All of these websites offer news services in

Chinese and the Peoples Daily, Xinhua, and China.org.cn also run sites in Spanish,

French, Arabic, and Russian. In addition I have looked at Western media websites

which include the Australian ABC, CNN, Wired, The BBC Online, China Online, and

Muzi.com. Some of the Western media websites represent ‘offshore’ Chinese websites

produced from areas outside of China. This has been supplemented further by

information from the EastSouthWestNorth blog maintained by Roland Song in Hong

Kong. Song translates and comments on news articles and stories circulating in the

Chinese media. Many of Song’s translations come from the Gangzhou newspaper

Southern Daily (Nanfang Daily 南方日报) and its weekend counterpart the Southern

Weekend (南方周末), both of which have been most valuable. These papers have a

reputation for good investigative journalism and the papers often test the boundaries

of what can be published. The Danwei website also translates and comments on

stories circulating in the Chinese press. Other sources include Amnesty International’s

website and Reporters without Borders and the China Digital Times website run by

the Berkley China Internet Project through the Graduate School of Journalism at the

University of California. This list is not exclusive by any means as the Internet has

provided me with a vast reservoir of sources and information.

One of the interesting aspects of examining these ‘translated’ versions is the double

rearticulation that occurs when language is translated for public consumption on new

media forms like the Internet. Many websites can be accessed in a variety of

languages depending on where they are produced and for whom. Usually there is the

primary/native language of the country for which the site is predominantly designed,

but users of the Internet – particularly users of nodes such as the World Wide Web

Sniffer Packets & Firewalls 21

(WWW) and search engines like Google can accommodate translations. That is users

can request and/or click on which language they want to read a website or article in.

Whilst these translations need to be checked they at least give a rough idea of the

content of a website.

Even though I have studied the Chinese language in China at Hangzhou University

and worked in Beijing teaching English my level of Chinese is intermediate, hence I

have chosen to analyse the English versions/translations that appear in the

aforementioned websites. In addition to this I have had discussions with the Peoples

Daily Online in Beijing and have done some work polishing stories for this website,

though this was done mainly in Australia via the Internet. This website also has a

small staff and so generates a small number of stories. As a result the bulk of the

stories are direct translations of what appears in the hardcopy Chinese language

version or stories that come from the English section of the official Xinhua news

agency. In the end I have still looked at the two competing versions of China and the

CCP that circulate on the Internet. The official Chinese government version and the

version generated by the Western media and Chinese dissidents: The West’s

authoritarian version of the CCP and the benevolent ‘serve the people’ version of the

CCP of itself.

The Development of the Net

The first computer network in China was established in 1987 (Tan & Foster, 1998,

p.114). As in many other countries the first network was developed for academic

purposes. CAnet (China Academic Network) was developed so that Chinese

researchers could exchange information with the European Research network. The

China Research Network followed CAnet, and in 1993 the Institute for High Energy

Physics (IHEP) developed the first network to have full access to the Internet (Tan &

Foster, 1998). In 1997 the China Internet Network Information Center (CNNIC)

released its first survey and estimated that the number of users was 620,000

((CNNIC), 1997). As Alex Tan points out these figures are problematic because they

do not count the number of users sharing Internet subscriptions, nor the number of

people who have access to the various Intranets that do not access the Internet (Tan &

Sniffer Packets & Firewalls 22

Foster, 1998). Nor did the original survey take into account the number of users

whose only means of access is at Internet café.

Since the release of the first report in 1997 the CNNIC the semi-annual surveys have

become more sophisticated in the way that data is collected and are now seen as one

of the most authoritative sources of information on the growth of the Internet in

China. According to the 21st CNNIC Survey released in January China looks poised to

overtake the United States of America as the world’s largest Internet market. As of

January 2008 China boasted 210 million Internet users, just 5 million short of the

USA ((CNNIC), 2008).

Literature Review

The literature reviewed has been divided into that concerned with the concepts that

are used to understand the management of informational flows of information and its

relationship to the management of time and space, and literature where the major

focus is the Internet and democracy.

The Internet in China

The earliest literature to appear on the Internet in China mainly gave background to

the development of the infrastructure, and this is discussed in chapter two. A

significant source of historical background on the development of the Internet that is

pertinent to this thesis is by Zixiang (Alex) Tan and Will Foster. Though their report

entitled "Internet Diffusion in the Peoples Republic of China" (1998) is quite dated

now, it still provides excellent background on the early development of

telecommunications infrastructure. Another paper by Zixiang (Alex) Tan, Milton

Mueller, and Will Foster, "China’s New Internet Regulations: Two Steps Forward,

One Step Back", published in 1997, also provides good background to the policy

process and Internet development in the PRC. The report sheds light on the politics of

decision making concerning the Internet in the early days, particularly the battle for

control over the Internet in China by all the ministries that have a perceived stake in

this kind of development. Unfortunately the report appeared in March 1998, just

before the final outcome of this struggle, which was the formation of a ‘super

Sniffer Packets & Firewalls 23

ministry’6, the Ministry of Information Industries, headed by Wu Jichuan. This new

ministry includes the former Ministry of Posts and Telecommunications, the Ministry

of Electronics Industries, the Ministry of Broadcasts Film and Television.

Earlier studies that focused on the battle for bureaucratic control of the Internet

include “Convergence and China’s National Information Infrastructure” by John Ure

and Liang Xiong-Jian (2000), which is a more up to date analysis of China’s

information infrastructure (CNII). This paper examines the political process that led to

the amalgamation of the MII. The authors argue that the merger was not a shift

towards a convergence of policy and regulation of information, and communications

industries, but rather close inspection of the political process involved revealed it was

merely a part of a more general overhaul of the bureaucracy and an exercise in cutting

state expenditure.

To date, the literature on the Internet in China largely reflects the paradoxes outlined

above. Some of the literature suggests that the Internet is a catalyst for change that is

facilitating private citizen’s participation in politics, while at the same time other

sectors of the literature claim that the CCP has been successful in the control of the

medium. Dark Guests and Great Firewalls: The Internet and Chinese Security (2002)

by Ronald J. Deibert looked at the debate surrounding the impact of the Internet on

Chinese politics and security policy. Deibert separates the debate into two camps,

cyber libertarians, and a more pessimistic group who argue that the technology of the

Internet has surveillance qualities and therefore represents a threat to privacy and

reinforces the authority of the state. The cyber libertarians argue that the Internet is

uncontrollable and they accentuate the contradiction between the attempts to control

territorial space and the challenge that the Internet represents to this because of the

spread of the technology around the globe. Diebert’s work is important in that it

clearly outlines the dichotomy of freedom and control that permeates much of the

literature in this area.

6 Super Ministries are when a number of ministries are amalgamated, and form very large bureaucratic bodies.

Sniffer Packets & Firewalls 24

One of the earliest papers to deal with the Internet in China which supports the idea

that the government would not be able to control the technology of the Internet is a

paper by Geoffrey Taubman. These claims were made because of the seemingly

uncontrollable nature of the technology. Taubman (1998, p.268) writes that:

given the rapid pace of diffusion of the Internet and related tools, along with the growth in content providers and the decentralized and increasingly inexpensive nature of the technology , governments will have difficulty preventing Internet-driven information pluralism without incurring significant economic and political problems in the process.

Taubman claimed that the demise of the CCP was inevitable as a consequence of the

Internet. Now ten years on it is easy to critique Taubman’s position as deterministic,

however Taubman still highlights the assumptions made about the inevitability of

democracy and the ability to control the Internet.

The censoring of the Internet in China has become a big global issue and this is

reflected in the literature. Much of the work here has focused on regulation and

technological means to filter and censor the Internet in China (Endeshaw, 2004;

Sohmen, 2001). Randolph Kluver has looked more specifically at the development of

e-government and the way that the Internet might be used for modernisation of the

government (Kluver, 2005). The most significant study on global Internet filtering

was undertaken by The OpenNet Initiative, a joint-venture between the Munk Centre

for International Studies, University of Toronto, Berkman Center for Internet and

Society at Harvard Law School, and the Advanced Networks Research Group at the

Cambridge Security Program (Centre for International Studies) at the University of

Cambridge. This study culminated in a report on Internet filtering in 2004 2005, and

provides valuable insights and material for the section on censorship ("Internet

Filtering in China in 2004-2005: A Country Study," 2005). The study and the report

have also generated the book Access Denied (2008) edited by Ronald Diebert, John

Palfrey, Rafal Rohozinski and Jonathon Zittrain.

In their essay “Who is Setting the Chinese Agenda? Impact of Online Chatroom on

Party Press”, Li Xituang and Qin Xuan argue that the Internet represents a serious

challenge to the Party controlled press and its ability to control the significance of

Sniffer Packets & Firewalls 25

events. The paper uses content analysis of the People’s Daily (Renmin Ribao) and the

Chatroom Strong Nation Forum (Qiangguo) in the days following the mid-air plane

collision between an American Spy Plane and a Chinese Jet Fighter in 2001 to argue

that the Internet has an impact on the setting of an agenda in Chinese politics. While

the writers do not acknowledge the limited number of Internet users in China at the

time and in what ways they are representative of the population at large, they have

illustrated the way in which the free flow of information has the potential to

undermine the authority of the CCP. However, their argument about the agenda

setting ability of the Internet fails to take into consideration the ability of the CCP to

limit or silence the media.

Other studies have specifically focused on the intensification of nationalism on the

Internet in China (S.-D. Liu, 2006; X. Wu, 2006; Yongming Zhou, 2005). These

studies have focused on protests following incidents such as the spy plane incident,

the bombing of Belgrade embassy, and the Diaoyou islands dispute. Both Zhou

Yonming and Xu Wu argue that the emergence of nationalism on the Internet in

China is independent of state-sponsored nationalism. However, nationalist sentiments

have been allowed to flourish at different times, such as the disputes named above,

and have been tapped into by the state to advance their negotiations in those disputes,

and toned when the disputes were no longer of great significance to the CCP.

Nationalism is one of the central themes of this thesis and is particularly relevant to

my discussions of online games and hacking.

Many of the works to appear on the development of the Internet in China and its

impact on the political culture of the country use Jurgen Habermas’s concept of the

public sphere and civil society (Hartford, 2000; Kalathil & Boas, 2003; Tai, 2006; X.

Wu, 2006; Yang, 2002, 2003a, 2003b; Yang & Calhoun, 2007; Zheng, 2008;

Yongming Zhou, 2006). The literature in this area has generally focused on the

argument that the Internet is providing the means to make over China’s political

culture from the bottom up through the creation of a space in which citizens can

participate within public life and influence the government, and this is a pre-requisite

to the formation of democracy within China. Both Historicizing Online Politics by

Zhou Yongming and The Internet in China: Cyberspace and Civil Society by Zixue

Tai look at the development of the Internet and its potential for the development of

Sniffer Packets & Firewalls 26

civil society. Xu Wu’s book Chinese Cybernationalism also uses the concepts of the

public sphere and civil society to argue that the Internet has enabled a new form of

Chinese nationalism to emerge that is not state sponsored and is an extension of the

nationalist movements of the last century. Goubin Yang and Craig Calhoun also argue

that the Internet has been instrumental in the development of what they call a green

public sphere, in their exploration of the management of environmental issues in

contemporary China. Yang has also written several other journal articles that are

influenced by the work of Jurgen Habermas, and which argue that the Internet is

facilitating the development of a public sphere (Yang, 2002, 2003a, 2003b; Yang &

Calhoun, 2007). Zheng Yongnian in his book Technological Empowerment argues

that the Internet empowers both the state and society through the creation of a forum

for conducting politics which has opened up new forms of civic engagement that

promotes political liberalisation through increased political transparency and

accountability (Zheng, 2008, p.167) .

The Public

John Hartley makes similar argument to Anderson’s Imagined Communities, about

the creation of the public domain from pictures. In his book The Politics of Pictures

(1992, p. 35) he writes that:

nowadays there is no physical public domain, and politics is not ‘of the populace’. Contemporary politics are representative in both senses of the term; citizens are represented by a chosen few, and politics is represented to the public via the various media of communication. Representative political space is literally made of pictures-they constitute the public domain.

Essentially Hartley is arguing that a ‘public domain’ is created by the media and is

viewed through pictures. For Hartley the media is the site through which the public

process of politics is played out and visualised, or physically created through pictures

The Internet is another visualisation of the public only through text and pictures the

construction of which is in part manufactured by the Internet using public through

chatrooms BBS bulletin boards blogs, social networking sites such as Facebook, and

MySpace. However, this space is increasingly fragmented by language, age and

location that splinter ‘the public’ into many ‘publics’.

Sniffer Packets & Firewalls 27

Viewing the Internet as a space in which the public can be imagined and observed is

a theme that runs throughout this thesis. To some degree the CCP uses the Internet as

a window on public opinion. Xu Wu writes “People.com.cn and Xinhuanet.com also

set up online ‘hotlines’ to gather people’s feedbacks on some policy issues and lead

to information on criminal activities. In fact, this type of online forum has already

become the party’s wind vane to test public opinion and a new source of Internal

References”8 (X. Wu, 2005, p. 222). There is now emerging evidence that the

Internet is being used to solicit opinions such as the proposed changes to the public

holiday system in late 2007 ("China makes 3 traditional festivals holidays," 2007). In

January 2008 it was reported on the China.org.cn Web site that many ministers and

high-level bureaucrats kept in touch with public opinion through the Internet.

However, all stressed the need for caution on the validity of public opinion in this

forum ("Web media challenge governmental spokesmen ", 2008). In June 2008 Hu

Jintao ("President promises divergent voices be heard online," 2008) said in chat

with ordinary citizens that “I try to know through the Internet what people are

concerned about and what they think (on a wide range of topics). "I'm willing to get

an idea on people's complaints of and proposals to the work of our Party and the

government…. The Internet is an important space to know about people's thoughts”

.

Globalization

The calls for the development of the Internet by anyone with a vested interest in the

medium’s development are often based on assumptions about globalization,

particularly in the way globalization relates to the imperatives of global

communication and capitalism. The Internet is also being claimed as global cultural

space, and as such the concept of globalization needs further examination. The myth

about the democratizing effects of the Internet is tied to myths about globalization.

There is some controversy over the precise meaning of the term globalization.

However, as Majorie Ferguson points out, there is general agreement about certain

points. Ferguson argues that globalization is an historical, economic and cultural

8 Internal References is the internal (neibu) media that is confined to the ruling elite. For more on this see Lowel Dittmer in Chin Chuan Lee’s (ed) (1998)China’s Media, Media’s China.

Sniffer Packets & Firewalls 28

process, and that it is a journey with a destination, which is the globalized state

(Ferguson, 1992). Ferguson’s essay “The Mythology about Globalization” published

in 1992 is important because it exposes many of the underlying assumptions made

about globalization by examining the discourse surrounding the concept, as well as

the associated problems of meaning and empirical evidence. In her evaluation of the

concept she argues there are myths about globalisation that are used to serve

ideological and explanatory ends. These are ‘Big is Better’, ‘Time and Space have

disappeared’, ‘Global Cultural, Homogeniety’, ‘Saving Planet Earth’, ‘Democracy for

Export via American TV’, and the ‘New World Order’. For Ferguson the formation of

a global culture is greatly exaggerated and mythologised by those whose interests are

closely tied to its implementation. In terms of the myths that Ferguson describes little

has changed since the essay was written. My main criticism of Ferguson’s essay is

that at times it is unclear what kind of status she wants to give to the increased activity

of transnational capital and the media in particular. What Ferguson’s essay does best

is to remind us that it is important to note who is saying what, and that the basic

assumptions behind such concepts should be closely examined. Ferguson’s essay

interrogates the underlying assumptions that form the basis of the monopoly of

knowledge that Western civilization uses to advance its quest in space. Though the

term globalization is problematic it is still useful as a framework for understanding

transnational media flows and the consequences of this flow.

The Internet

The literature on the Internet is now quite wide ranging, and as such I will confine my

discussion to the literature that deals with the Internet and the way it is controlled or

rather managed by governments. Generally, here the questions are: Is the Internet a

democratic space, and what are the implications for democracy that stem from the

development of the Internet?

Ronald J Diebert uses medium theory to examine the shifts that he sees taking place

in political power as a result of the development of digital telecommunications

technology. He argues that the Internet “favours a complex diffusion of production

across territorial/political boundaries by facilitating multilocational flexibility,

transnational joint ventures, and both global and localization and “local” globalization

–the latter best evidenced by the commercialisation of the World Wide Web” (1997,

Sniffer Packets & Firewalls 29

p. 204-205). Diebert’s work is of significance in order to understand of the CCP’s

adaptation to a changing media environment in that it provides a framework for

thinking about how the CCP has managed the consequences of the adoption of the

technology. This position emphasises the role that society plays in the adoption of

new technologies and rejects a technological deterministic position such as the myth

that the Internet will force China to become democratic. In addition, Diebert’s postion

stresses the importance of the active role that governments and societies in general

play in the way that technologies are used and adapted to local cultural and politcal

conditions.

Other works in this area focus on how the Internet can be controlled. Laurence Lessig

critiques the libertarian notions that the Internet was first founded upon and the

rhetoric upon which its development was promoted. Lessig’s main argument is that it

is the code that is used to develop the architecture of the Internet that is the basis of

the regulation of cyberspace and as such he equates code with law. Lessig (2006, p. 6)

writes that:

We can build, or architect, or code cyberspace to protect values that we believe are fundamental. Or we can build, or architect, or code cyberspace to allow those values to disappear. There is no middle ground. There is no choice that does not include some kind of building. Code is never found; it is only ever made and only ever made by us.

Lessig’s notion of code as law is particularly pertinent as the use of code to manage

and regulate the behaviour of Internet users in China is the basis of what is often

referred to as the Great Firewall.

The theme of regulation has also been taken up by Jack Goldsmith and Tim Wu, who

critique the myth that the Internet is uncontrollable, rendering territorial governments

irrelevant. Goldsmith and Wu (2006a, p. 66) argue that governments have been able

to assert control over offshore Internet communications through coercion at the local

level. Goldsmith and Wu looked at the way that different governments around the

world have sought to regulate the Internet, and the ways that different governments

have sought to shape the architecture of the Internet itself, so as to correspond to each

Sniffer Packets & Firewalls 30

state’s ideological vision. They argue that “ the China example shows, a

government’s failure to crack down on certain types of Internet communication

ultimately reflects a failure of interest or will, not a failure of power” (Goldsmith &

Wu, 2006a, p. 89).

Similar arguments are made by Kalathil and Boas in their assessment of the ability of

authoritarian regimes to control the Internet. They argue that the Internet poses no

real threat to authoritarian regimes and they are able to do this through “the Internet’s

physical and policy architecture” (Kalathil & Boas, 2003, p. 136). They write that,

“in fact, the state plays a crucial role in charting the development of the Internet in

authoritarian regimes and in conditioning the ways it is used by societal, economic,

and political actors” (Kalathil & Boas, 2003, p.136). I seek to extend the arguments

made by these writers by including the development of content as a part of the overall

strategy for managing the consequences of the Internet, analysing the CCP’s direct

attempts at shaping the physical content of the Internet itself within the context of

China.

The Layout

This thesis has been divided into three parts, with the first part, chapters 1-4 providing

background on the development of the Internet in China and the changing media

environment. This section also covers the theoretical framework in chapter 2. Part

two, chapters 5-9 deals with the ways in which the Internet is used and how those uses

are managed, and the final section is the conclusion.

The Media Chapter 3

The changes in China’s mediaspheres as a consequence of the Open Door policy have

seen a shift from public consumption of media to the private consumption of media.

The once ubiquitous loud speaker has been replaced by and large by the television, a

change which is in a sense symbolic of this shift. Chapter 3 examines the changing

media policy environment and the ever more complex mediasphere where the state

owned and run media are increasingly subject to market forces. The implementation

Sniffer Packets & Firewalls 31

of media policy is further complicated by the centre margin relationships between

Beijing at the centre and the provinces at the margins.

Modes of Censorship Chapter 4

Chapter 4 outlines the strategies used by the CCP to censor the Internet. The CCP has

sought to develop an Internet in China that is separate from the rest of the World

Wide Web, through strategies that have been employed to maintain the CCP’s

monopoly of knowledge. That is, through legislation, the code used to construct the

architecture of the Internet that has facilitated surveillance, and the blocking

capabilities of the authorities. The development of content has also been a part of the

strategy of the CCP to separate and maintain their authority over the monopoly of

knowledge in circulation within the borders of the country, and to engage with and to

present the CCP’s point of view to an international audience.

NGOs Chapter 5

Jurgen Habermas’s concept of the public sphere has been central to the debate about

the impact of the Internet and its potential to force China to become more democratic.

To date the four leading texts (Tai, 2006; X. Wu, 2006; Zheng, 2008; Yongming

Zhou, 2006) that seek to analyse the medium and its impact on Chinese politics and

society have used the concepts of civil society and the public sphere to talk about the

changes that have taken place since the widespread introduction of the technology and

the growth in the number of users. There have been a number of journal articles by

Goubin Yang who also uses Habermas’s notion of the public sphere to explain the

changes in China that he sees as a consequence of the development of the Internet.

Hacking Chapter 6

The myth that the Internet is uncontrollable is in part perpetuated through the ability

of networks to be hacked into. Hacking has been used by groups for both political and

criminal purposes. In 2002, 2003, and 2004 Falun Gong hacked into Chinese satellite

and cable television networks that beam into the mainland and broadcast messages.

International incidents such as the bombing of the Chinese Embassy in Belgrade in

Sniffer Packets & Firewalls 32

1999, and the mid air collision between a USA military spy plane and a Chinese

fighter pilot in 2001 sparked hacking wars between Chinese and American

nationalistic groups. Chapter 6 looks at the ways in which hacking has been reported

by the Chinese and Western media, how this centre/margin relationship is played out,

and how this is visualized in the media. In the context of this chapter core/periphery

relationships refer to the interaction between sovereign nations and the interactions

between the citizens and their interactions with the state, and foreign states. This

chapter also looks at the way that democracy dissidents outside of China have made

use of hacking to promote their views.

Disasters & Starbucks Chapter 7

The management of information in a disaster is crucial to the way in which a crisis is

resolved. Modern China has a history of covering up the extent of disasters and their

causes, and traditional modes of communication allowed local officials to prevent the

spread of information about disasters. The Severe Acute Respiratory Syndrome

(SARS) outbreak in 2003 that began in southern China has had a profound impact on

the way that disasters and accidents are handled because of the use of the Internet and

mobile phones to spread information about the outbreak. The way that this incident

was handled by officials demonstrates the way in which the Internet was used by

private citizens to circumvent official channels of information. In the case of the

SARS outbreak, Xu Wu (2005, p. 222) makes the suggestion that the Internet and

mobile phone sources of information were more reliable than the state media. There

has also been an admission made in the Chinese press that the SARS outbreak made

the government rethink the way that information is handled. The editorial said that “It

was SARS that made the Chinese authorities aware of the importance of protecting

the public’s right to know and the dangers and risks of a possible government cover-

up. This year, the Chinese media did not hesitate to report big events like the severe

winter weather in southern China, the Lhasa riot on March 14, and the derailment and

collision of passenger trains in Shandong Province on April 28” ("Commentary:

Quick media response reveals transparent gov't in China," 2008). This is another clear

indication of the shift from the suppression of information to the management of

information.

Sniffer Packets & Firewalls 33

The Blogosphere Chapter 8

Many journalists in China maintain their own weblog or blog and they do so because

the medium allows them more freedom to write about what they are interested in than

their day jobs allow. Blogs have also been used by activists in China to get the word

out on the issues that they are campaigning for. Blogs and the material found on them

is managed in the same way that other areas of the Internet are managed and that is

though legislation, the code used to construct the architecture of the Internet and

through the development of content. In chapter seven I look at the ways in which

China’s blogosphere is managed and the advent of ‘citizen journalism’ through the

coverage by bloggers of the destruction of a family home when the owners refused to

move for a development. It is the examination of events such as this that reveal the

ways in which blogs have been used by marginal groups outside of the party and

reveals the tensions and shifts that occur in these relationships that are constantly

under negotiation.

Online Games Chapter 9

Online games in China are big business and attract millions of players. Chapter 9

charts the management strategies of this sector of the Internet as part of their bid to

create a virtual Chinese world. The growth of online games and the development of

the industry through direct investment by the government in the game content have

led to the creation of games with a nationalistic theme.

Conclusion Chapter 10

The thesis concludes with an overview of how media information flows are managed

by the CCP, and a discussion on the prospects for political change for China. The

continued change will not come so much from the Internet itself, but in the ways that

people will make use of the technology and the limits that the CCP place on that use.

This must also be contextualized against China’s own internal politics and its

deepening engagement with the international community. For example, hosting the

Olympics in Beijing has resulted in an enormous amount of international pressure on

China to address human rights across the country but particularly in Tibet.

Sniffer Packets & Firewalls 34

C h a p t e r 2

“Imagine if the Internet took hold in China. Imagine how freedom would spread.”(George W. Bush in Phoenix, Arizona during a GOP Debate, Dec 7, 1999)

“In the new century, liberty will spread by cell phone and cable modem … We know how much the Internet has changed America, and we are already an open society. Imagine how much it could change China. Now, there’s no question China has been trying to crack down on the Internet --- good luck. That’s sort of like trying to nail Jello to the wall.” (Former President of the United States Bill Clinton 8 March 2000)

The above quotes highlight the assumptions that are often made about the Internet,

and the alleged ability of the technology to somehow deliver democracy. It is often

seen as deterministic, and these kinds of assumptions about the impact of innovations

in communications technology are not new. The views expressed above are consistent

with a libertarian view of informational flows and the Internet whereby the

architecture of the Internet is somehow neutral and information can flow freely. This

is because the purpose for which the Internet was built has lent itself well to the kinds

of ideas expressed in the quotes above. This chapter outlines the theoretical

framework and that ties together many of the themes of this thesis, the themes of the

dichotomy for the desire for the technology and the perception of the need to ‘control’

it, the myth that the Internet is inherently democratic and the management strategies

employed by the CCP to manage information flows via the legislation, the investment

in content and the code used in the architecture of the Internet.

Medium Theory

It is often assumed by medium theorists (Carey; Comor; R. J. Deibert; Drache &

Beyer; Harold A Innis; M. McLuhan & Fiore) that the introduction of a new form of

communications technology into a society will directly affect and alter a country

and/or culture both socially, cognitively, economically, and politically. For example,

Marshall McLuhan (1997; 1967; 1989) argues that innovations in communications

technology directly influence and change a country and/or culture a society,

politically, and economically. As well as changing the way in which people process

information. This media effect concept is a limited technologically deterministic one.

My view is that the introduction of the Internet into China cannot be studied in

isolation, or from a technologically determinist position, but must be studied within

Sniffer Packets & Firewalls 35

the context of the social and knowledge flows that comprise modern China. In order

to study the impact of the Internet in China in relation to how information flows are

managed internally and externally, I will utilize the concepts of medium theory, in

particular the ideas of Harold Innis (1951, 1952, 1972, 2004). This is because his

work was concerned with the interaction between the interests of those who controlled

the flow of knowledge and the vehicle for the dissemination of information. Innis

(1951) argued that communications technologies are used to exert influence over time

and space, and that they are subject to the interests of a particular group who, in his

words, represent a ‘monopoly of knowledge’. He asserts that (1972, p.7):

The concepts of time and space reflect the significance of media to civilization. Media that emphasize time are those that are durable in character, such as parchment, clay and stone. The heavy materials are suited to the development of architecture and sculpture. Media that emphasize space are apt to be less durable and light in character, such as papyrus and paper. The latter are suited to wide areas of administration and trade. The conquest of Egypt by Rome gave access to supplies of papyrus, which became the basis of a large administrative empire. Materials that emphasize time favour decentralization and hierarchical types of institutions, while those that emphasize space favourcentralization and systems of government less hierarchical in character.

Innis was not arguing the case for technological determinism, but rather through his

examination of different media within different historical moments showed a certain

interaction between the management of time and space and communications

technology which he always saw as having a contradictory potential (Drache &

Beyer, 1996). Innis (1951, p.75) states that in regard to the Middle Ages:

A balance between concern with space or extent of territory and duration or time appears to depend on a dual arrangement in which the church is subordinated to the state and ensures that the mobilization of the intellectual resources of the civilization concerned by religion or by the state, will be at the disposal of both and that they will be used in the planning for a calculated future in relation to the government of territory of definite extent.

It is also worth noting that Innis (1993) was interested in communication in China,

especially the impact of Western technologies on traditional Chinese communication

Sniffer Packets & Firewalls 36

patterns that remained an amalgam of the oral and the written until very recently. This

interest focused on the manner in which perceptions of time and space changed in

China after the introduction of the modern press and the manner in which the

Western-style press disrupted the balance between traditional orality and written

communication.

Primarily, Innis was concerned with the impact and challenges that new forms of

communications had on existing power relationships. He argued that new forms of

communication facilitated a shift in the monopolies of knowledge and power among

ruling elites. He states that, “inventions in communication compel realignments in the

monopoly of knowledge” (1951, p. 4).

Edward Comor (2001, p.280) argues that Innis observed a “dialectic between what he

called ‘monopolies of knowledge’ and ‘monopolies of power’. Comor (2001, p.280)

writes

By monopoly of power, Innis was addressing the predominance of entities capable of applying extraordinary military resources. By a monopoly of knowledge, he addressed those interests possessing extraordinary control over what information is available and/or those having a predominant influence over more complex patterns orhabits of social thought. In other words, this latter ‘monopoly’involves explicit and/or implicit control over the social pool of information and how that information is used in developing what is ‘known’.

In the case of China the CCP clearly has clear control over the ‘social pool of

information’. Though the Internet has enabled Chinese citizens, with acces to the

Internet, to participate in a new form of public life there is still no space in which

dissent from the governments point of view is allowed. As far as the Internet is

concerned the CCP has sought to maintain its autority over ‘what is known’ through

the developmnet of content and through the code used to construct the architecture of

the Internet. Code is also used to develop content especially in the development of

online games.

Sniffer Packets & Firewalls 37

Innis’ concept of a monopoly of knowledge is comparable to Foucault’s (1979)

conception of discourse, in that knowledge is produced and defined by a particular

group who control the means of communicating that knowledge. In the case of Innis,

communications technology is subordinated to the interests of particular monopoly of

knowledge. Both seek to chart the power relationships that arise from the way that

knowledge is disseminated and controlled. Foucault was also interested in the way

that technology was used to manage societies. James Boyle (1997) uses Foucault’s

theories of discourse and power to look at the attempts to regulate Internet content in

the USA. Boyle (1997 n.p.) contends that “Foucault argued that, rather than the

public and formal triangle of sovereign, citizen and right, we should focus on a series

of subtler, private, informal and material forms of coercion organised around the

concepts of “discipline" and "surveillance.”

Both Foucault and Innis looked at the interaction between society and technology and

the ways in which technology shaped society and society shaped technology. The

Internet within the Chinese context is often likened to Bentham’s panopticon as

mediated by Foucault. Lokman Tsui’s (2001) unpublished Masters thesis uses

Foucault’s mediation of the panopticon to look at surveillance of online activity in

China, and so does Gudrum Wacker (2003) in her chapter The Internet and

Censorship in China, in the book China and the Internet: Politics of a digital leap

forward. The technology is used for surveillance of citizens and Chinese management

strategies emphasize self-censorship or self-discipline in their use of the medium.

Using Innis’s notion of time and space in this context the Internet is a tool for

managing the population within China, and managing time in terms of influence and

ideas, through the construction of an official voice in Chinese cyberspace. Foucault

(in Horrocks, 2004) writes that “space is fundamental in any exercise of power”. As

Comor (2001, p.283) puts it “efforts to control space and/or time also involve

attempts to monopolize force which, according to Innis, involve a range of control

activities from brutal oppression to the more subtle implementation of surveillance

technologies”.

The Internet can be viewed as a sphere of influence and another site in which multiple

versions of reality or versions of an event can be constructed from various locales and

their monopolies of knowledge. As Cox (1995) determines, “Innis’ concern lay in the

Sniffer Packets & Firewalls 38

thought processes through which people of different civilisations define their vision of

reality . . . [H]is focus is less on the individual than on the character of the society that

produces individuals and either releases or suppresses their creative potential.” The

Internet then serves as a point at which multiple versions of reality can be observed.

Innis quotes Hume (1951) to argue that public opinion is all that supports any

government. Hume writes “As force is always on the side of the governed, the

governors have nothing to support them but opinion. It is, therefore, on opinion that

government is founded; and this maxim extends to the most despotic and the most

military governments as well as to the most free and most popular” (in Harold A

Innis, 1951, p.4). This is similar to the Chinese proverb water can carry a boat, but it

can also overturn it (水能載舟,水能覆舟).

The notion of a monopoly of knowledge is also similar to the concept of hegemony

whereby a ruling class maintains power over subordinate classes through the constant

negotiation and struggle over ideas or worldviews that are circulating within a society,

or between different states. The concept of hegemony is rooted in class struggle,

where as Innis’s ideas about the monopoly of knowledge and its connection to the

management of time and space are traced through examining power relationships and

their connections to communications technology. Hegemony as the management of

perceptions is similar to the management of time; however Innis was talking about

multiple conceptions of time: biological time, archaeological time, scientific time,

historical time, and the way these different conceptions of time are used to serve a

monopoly of knowledge. Comor (2001, p.284) writes

For Innis, throughout history, efforts by a particular group, collectivity or class to assert power, explicitly or implicitly, usually involves problematic efforts to control the temporal and spatial conditions (both mental and physical) of day-to-day life. Through historically structured biased media, powerful concerns often will attempt to normalize their interests as if they were natural, universal, inevitable.

Time or the management of time within the context of the CCP means not only a

hegemonic attempt to manage current perceptions or a particular view of the world,

but also means managing continual historical narratives, past and present. In addition

to this the management of time in relation to media form is highly pertinent when

Sniffer Packets & Firewalls 39

studying the production, dissemination and flow of information. This has become

more and more apparent as media forms become lighter and more easily transportable

and in the case of electronic and digital information what we have is simply pure data

– hence time in relation to information management is now focussed on the speed at

which one can manage the production, disseminate access, censor and alter

information. The management of information in relation to time, speed and digital

media is being played out via the online reportage of the case study events and creates

ruptures in the interaction between the ruling Chinese elite, and the margins (material

and ephemeral) of Chinese society, and beyond the borders of the mainland to Hong

Kong, Taiwan and Diaspora communities across the globe.

International relationships are played out through meetings and staged events such as

the G8 Summit and ASIA Pacific Economic Co operation (APEC) meetings. These

summits involve meetings press conferences and photo opportunities and it is in this

sense that politics and international relations are played out visually for the media.

These events themselves are played out and constructed for the purposes of

visualising politics. For example the ‘shirt shot’ at APEC where the leaders line up for

a photo in matching shirts signify the host nation, or the door stop interview as leaders

enter parliament house in Australia are examples of this constructedness and

visualisation. These instances are also a feature o the management of time as the

representation and presentation of reality. Time in this sense is the construction of

reality.

The Internet is also a site where China’s interaction and relationships with other

nations can be viewed on some levels this occurs when competing versions of the

same event exist within the same space. These versions of events consist of official

statements from the heads of governments and a form of foreign relations is played

out in this way. This happens at the level of the state and at the level of citizens

interacting with one another. The incidents and the way that they have been played

out in the media in China and elsewhere are a visualisation of spatial relationships.

For example in the case of the spy plane there is both the official Chinese and United

States versions of events as well as unofficial versions accessible from the Internet.

Via the Internet it is possible to trace the negotiations between China and the USA to

repatriate the crew of the plane via official statement from the leaders of both

Sniffer Packets & Firewalls 40

countries. Further to this both China and the USA present their views of the world in

each other’s language to ‘win the hearts and minds’ of a global audience. The

relationship between the two countries can be examined on many levels. There is a

growing English language press on the Internet through official publications such as

The Peoples Daily, China Daily, Jiefang Bao, and China.org.cn. designed to counter

what is perceived to be the CNN view of the PRC.

Hegemonic relations are evident when considering the inherent tensions that exist

between the ruling Chinese elite and the rest of Chinese society, and China’s

interaction with the USA when viewed online as evidenced in the differing versions

of the same events reported via the various websites this thesis examines. Here, the

use of Innis’s conceptions of time and space more adequately explain these

hegemonic tensions, beyond that of class struggle. Hegemony overstates the position

of class struggle, and does not take into consideration the role of spatial relationships

both internally and externally, that is within the PRC and its relationship with other

nations and the Chinese Diaspora. This is demonstrated in chapter 6 on hacking and

the interaction between Beijing, the USA Germany, Britain, Australia and New

Zealand.

There are tensions and interactions between the centre and the margins, the centre

being the ruling elite and margins the rest of society including provincial

governments. Hegemony implies that the centre has an implicit power over the

margins. The ideas that are generated from the margins are absorbed by the ruling

elite, and this is inadequate for explaining the changing relationship that the ruling

elite has with the rest of Chinese society. These changes are not just a result of the

development of the Internet, but of the reform process and the opening of the

economy and society. An exploration of the interaction between centres and margins

allows flexibility in the articulation of points of view in the management of space and

this counters a position that sees the management of information as hegemonic.

This chapter has outlined the theoretical framework for this thesis. The case studies

in Part Two will illustrate the ways in which the CCP has sought to manage time and

space in response to the development of the Internet. The following chapter looks at

Sniffer Packets & Firewalls 41

the media in China and explores some of the consequences of the reform of this sector

of the economy. Many of the broader issues that affect the media also impact upon the

way in which informational flows are managed within the PRC as a consequence of

the Internet. In effect what I have done in the next chapter is to look more closely at

the way in which time and space are managed via the media in Mainland China.

Sniffer Packets & Firewalls 42

C h a p t e r 3

The Media in China

In 1992 my morning slumber was shattered by the echoing calls of “good morning

Hangzhou University”, as it reverberated throughout the campus on a network of loud

speakers. Half-hour broadcasts of official news and information marked time

throughout the day when transmissions resumed at lunchtime and then again in the

evening at 5pm. The blaring loudspeakers were also a common feature when I was

travelling between Hangzhou and Shanghai, as every factory seemed to have them.

When I returned to China in 2002 for fieldwork this once common feature of the

Chinese media was gone. The absence of the once ubiquitous and public loudspeaker

signifies a shift from public consumption of the media in China to private

consumption, and in some ways characterizes the shifts that have been taking place in

the media in China since 1978. This chapter explores the changing media policy

environment and the complexities of a mediasphere that is owned by the state but is

increasingly subject to market forces. Overlaying this is the interaction between the

central and provincial governments, and the way that policy is formulated and

implemented. This chapter also highlights the way in which space is managed via

communications technologies in the PRC and the way in which spatial relationships

are negotiated between the central authorities of the CCP in Beijing and local and

provincial governments at the margins.

The table 1 traces the development of China’s media and comes from Media in China

Consumption, Content and Crisis edited by Stephanie Hemelryk Donald, Michael

Keane, and Yin Hong (2001, p.6). The table charts the shifts that have occurred since

1945 and helps to conceptualise the changes that have taken place in this sector. The

overall feature is the impact reform has had on the Chinese media.

Sniffer Packets & Firewalls 43

Table 1 Development of Chinese Media

Pre-reform 1980-99 2000-Economic System Command Economy The high cost of

upgrading technological infrastructure. The threats of foreign content and the impact of the WTO accession. Controlling the technology of the Internet.

Market reform; gradual decentralization of management

State capitalism authoritarian liberalism

Media Regulation Engineer state model Deregulation and gradual diminution of subvention of media industries

Architect state model (state facilitates regulatory guidelines for investment in infrastructure

Social stratification Egalitarian rice bowl New middle classes with economic capital; social capital residing in bureaucrats

Emerging digital divide; increasing economic stratification

Function of media Propaganda/mobilization of masses Pedagogic/reform of attitudes and conduct (spiritual civilization)

Informational; provision of repertoire of cultural choices

Types of media Print, posters, radio loudspeakers networks, film terrestrial TV

On-line news; chat rooms; pay and satellite platforms; DVD VCD; cellular telephones

Broadband cable; digital TV, WAPs iMode; new media technologies

Media characteristics Mass Line; cultural despotism Diversification; shift to entertainment function and entrepreneurial self sufficiency

Convergence; internationalisation of content

Crisis Establishing control and controlling factions within the press. Making the media into the mouthpiece.

Coming to terms with the costs of maintaining a public media infrastructure. Increasing tensions among media workers and problems of maintaining the traditional role of the media

The high cost of upgrading technological infrastructure. The threats of foreign content and the impact of the WTO accession. Controlling the technology of the Internet.

(Hemelryk Donald et al., 2001, p. 6)

Policy

The Open Door Policy, which began with the Third Plenum of the Eleventh Central

Committee in 1978, encouraged local political autonomy through the decentralisation

of decision-making and economic management (Goodman & Segal, 1994, p. 4). The

reform process that followed has increased the autonomy of decision making at the

provincial level, and this has also impacted upon media policy in China. Goodman

(1994, p. 13) writes that “The centre lays down the broad outline of a policy, with the

provinces adopting specific local measures for implementation”. This has given rise to

a political culture that is increasingly marked by regionalism. Xu Wu (2002, p. 12)

argues that:

In reality, it is not rare that the central policy has been interpreted differently, if not oppositely at the local level. The common situation is that fierce rivalries also thrive between many different layers of

Sniffer Packets & Firewalls 44

government. Sometimes one particular province made a lot of deals with foreign companies, without getting any central governments Okay. In other cases, Beijing denied the province’s permission, but lacked enforcement power.

This thesis looks at the impact of the Internet on regionalism as centre/margin

relationships. It is my contention that the Internet has enabled Beijing, as the centre,

to reinforce its central position of authority over provincial governments at the

margins.

The impact of economic reform on the media has led to a diversification in the way

that the media is structured; including an expansion in the sources and the types of

media available to the Chinese people further facilitating regionalism. Wu Guoguang

(2000, p. 47) notes that the media has gone from being concentrated in Beijing to

being dispersed throughout the country, further facilitating regional interests. Wu

(2000, p. 49) writes that, “while party-organ newspapers at the national and provincial

levels have suffered steep decreases in circulation since 1980, party-organ newspapers

at the district, city, and county levels have increased circulation at an average of 20

percent per year (except in 1981)”. Wu also points out that this has happened in other

forms of media such as television. The growth of television and its impact has been

well documented by James Lull (1991).

The decentralised nature of the Internet also radically challenges the traditional

hierarchical structure of the flow of information in China that filters from Beijing to

the municipal county and prefectural levels. The hierarchy of the national media

reflected the hierarchy of the CCP (W. Sun, 1996, p. 40). The national press for

example, is still headed by the Peoples Daily and is directly managed by the

Politburo. It is essentially a policy document, sections of which are often reprinted in

other papers throughout the country. The Provincial and County levels of the Party

also publish newspapers (Somerlad, 1981). Other media such as radio and television

are structured in the same way. For example the bureaucratic organization regulating

television operates in this way. That is, Beijing formulates and directs policy, which is

interpreted and implemented in each region and municipality. Policy directives are

usually vague and allow localised forms of interpretation and implementation. This

creates tensions between Beijing at the centre and regional interests at the margins.

Sniffer Packets & Firewalls 45

The result of this is that at times policy implementation becomes more important than

policy formulation, as the margins resist and at times defy the centre (Shoesmith,

1998).

In addition to the increase in the number of provincial players in the newspaper sector

there has been an increase in the number of official mass organizations state

sanctioned professional bodies that also publish their own newspapers. This includes

the Communist Youth League, official trade unions and women’s groups. Wu (2000)

argues that much of this non-state media has increased autonomy since the reform era

began, however it is still only allowed to exist with political sponsorship.

The table 2 illustrates the growth of non-party organ papers to 1994. The statistics do

not extend beyond 1994 because of a change in the way that information of this kind

is compiled.

Table 2 Growth of Non-Party Papers

Party Organs versus Other Newspapers, 1976-1994 No. Of NewspapersYear Party Organs Others1976 236 51977 238 61978 252 71979 270 101980 260 1201981 250 4511982 280 3801983 300 4901984 350 7001985 384 1,3261986 361 1,7901987 374 1,6851988 407 1,9151989 410 1,4961990 406 1,0361991 422 1,0921992 436 1,2301993 440 1,3501994 460 1,411

Source: Zhongg’lo xinwen nianjian, various years (G. Wu, 2000)

The Impact of the Market or Socialism with Chinese Characteristics

Media policy in the PRC must increasingly serve two competing interests, the CCP

and the market. On the one hand there is a policy that stipulates that the media is an

organ of the CCP and on the other there are the increasing demands of

Sniffer Packets & Firewalls 46

commercialisation and privatisation as the media is forced to operate within a market

model as government subsidies are withdrawn. There is also an increase in the

number of private media companies, and this has eroded the absolute power that the

party once exerted over the media (W. Sun, 1996). In 2001 this process of

commercialisation was further expanded to include foreign owned media operators

into the market. At that time Rupert Murdoch’s Star TV and AOL were able to begin

operations within the PRC, beyond the confines of large hotels and foreign

compounds, and the limited geographical area adjacent to Hong Kong, in Guangdong

province.

Privatisation is further complicated by investment by party run papers such as the

Peoples Daily. Wu (2000, p. 61) writes “as a partial response to the reduced market

share, the party press has established a series of umbrella newspapers and magazines

under its own auspices. A party newspaper is thus partially transformed into an

enterprise group in which the party newspaper remains as a core with other

periodicals acting as the branch companies”.

Despite increased commercialization of the media in the PRC it remains subordinate

to the interests of the party. In June 2008 Hu Jintao outlined his views on the media,

reiterating the position outlined by his predecessor Jiang Zemin and his concept of

‘guidance of public opinion’ that emerged after the Tiananmen Massacre in 1989

where the position of maintaining public order would be achieved by continuing to

control news coverage (Bandurski, 2008a, n.p.). In part this should be achieved by

“actively setting the agenda (Bandurski, 2008a, n.p.). Hu also said that “we must

integrate the metropolitan media, Internet media and other propaganda resources”

(Bandurski, 2008a, n.p.)

Conclusion

The relationship between the Internet and media policy in the PRC has yet to be fully

developed, however the Internet is still subject to the same sorts of political relaxation

and restrictions as the more traditional media such as newspapers, television and

radio. The way in which the Qigong sect Falun Gong has been dealt with is a good

example of this. Once it was decided that Falun Gong was an “enemy of the state” the

Sniffer Packets & Firewalls 47

Falun Gong Internet site was banned and an intensive campaign to denounce the sect

was played out on the Internet in much the same way that it has been played out in

traditional media. The next chapter traces the development of the Internet and

explores the methods that are used to censor and manage the flow of information in

more depth.

Sniffer Packets & Firewalls 48

C h a p t e r 4

Building and Censoring the Great Firewall

Censorship comes in many forms on the Internet in China. Censorship is about

defining the limits of what can and cannot be said. The goal of censorship of

cyberspace within the context of the PRC is to present a particular Chinese view of

the world that is branded and sanctioned by the CCP so as to maintain and preserve

the authority of the Party. The CCP aims to have the dominant voice in Chinese

cyberspace and this approach is consistent with the management of time through the

maintenance of the monopoly of knowledge. In this sense time is the management of

official discourse by defining the limits of what can be said and what subjects can be

discussed. It is also about attempting to limit voices of dissent, by eliminating and

demonising voices that oppose the government. This chapter will look at the ways the

central government has sought to manage the flow of information through the use of

technology and legislative mechanisms, and issues in relation to the development of

content.

The idea that the Internet can somehow deliver democracy because it is uncontrollable

and inherently ‘free’ is a myth. There is a paradox about the technology which is on

the one hand impossible to control, and on the other hand has the potential to be a

giant surveillance system tracing our every step through cyberspace. In this sense the

Internet is a giant interconnected panopticon with numerous central viewing points. It

is multiple panopticons that are interconnected technically but not always for the same

purpose. Boyle (1997, n.p.) argues that Internet has given rise to a number of ‘privatised

Panopticons’, and this can be extended to include government owned networks. There are

countless governments that are using the Internet for many different kinds of

surveillance of their citizens, as well as an enormous number of privately owned

companies using the Internet to collect information on users for marketing purposes.

Everything that anyone does on the Internet leaves some kind of electronic fingerprint

that says you have been there and that someone could be watching you. Even if you

do things anonymously through proxies, the machine that you view the Internet on

keeps a history of what you have done. To call it free and open is absurd.

Sniffer Packets & Firewalls 49

Most countries that are connected to the Internet seek to regulate the behaviour of

citizens through legislation. In the United States there is the Patriot Act, which is not

that, dissimilar to the regulations covering the Internet and its uses in China. The

Patriot Act means that the government can order ISPs to handover details of citizen’s

Internet activities. In Australia similar anti terror laws came into affect in 2005. The

justification for such laws in Australia, China and the USA are the same; national

security and public safety. The difference is how those factors are defined. In

countries like the United States of America, and Australia it is the threat of terrorism

that is used to defend this kind of legislation and surveillance of private citizens. In

China the justification is to maintain the stability and security of society. In both cases

there is the defining of a threat to national security, and this is the rationalization for

the need to use the surveillance capabilities of the Internet which is enshrined in

legislation.

The Internet is also a hotly contested space as different groups and governments fight

for influence. It is a sphere of influence and the space in which the struggle for hearts

and minds can be viewed. In terms of spatial management it is the creation of a sphere

of influence and this is an aspect of censorship, and is the other side of eliminating

other voices. Censorship not only aims to remove those voices that are not seen as

desirable, it also aims to create a particular view. In these scenarios the voices that are

not desirable are eliminated, and the voices that are seen as desirable are circulated

and promoted making it the officially sanctioned point of view. It is like the rhetoric

used by John Howard and George Bush; say it long and say it loud, you won’t drown

out the dissent but you will leave a lasting impression.

The CCP knows that it is impossible to control the Internet. What they seek to do is

maintain control over the identity of Chinese cyberspace. Censorship is a part of this

strategy. The main concern of the government in relation to the Internet has been to

develop the infrastructure and at the same time establish guidelines and possible

means of managing the flows of information. In order to do this the CCP has sought

to maintain their position as the dominant voice on the Mainland Internet and that is

through the development of content, and more directly through technological and

regulatory means. Content is shaped through legislation in terms of what can and

cannot be said, and this is supplemented further by the technology that is used to

Sniffer Packets & Firewalls 50

shape the architecture of the Internet so as to reinforce the legislation. Content has

also been developed through direct investment, such as the development of

government funded websites and direct investment in online games.

The position that I am taking is similar to Gudrum Wacker’s (2003) who also

acknowledges the paradoxical nature of the Internet as well as the CCP’s paradox of

desire and control of the technology. Wacker uses the work of Lawrence Lessig

(2006) who identified four elements that have the potential to contribute to shaping

online behaviour. These include “regulations, social norms, the market and the

architecture of the Internet itself” to look at the effectiveness of censorship” (Wacker,

2003, pp. 59-60). Wacker concludes that the CCP has been effective in its attempts to

censor the seemingly impossible, though the limits of control are constantly being

tested. For Lessig the way to understand how the Internet might be regulated is to

look at the architecture of the Internet or what Lessig calls the ‘code’. An example of

how the code can be used to regulate behaviour is when you have to provide

passwords to gain access to certain websites, or the use of encryption for privacy.

Wacker (2003,p. 60) writes that in order “to find out how cyberspace is regulated,

therefore we need to discover how the code regulates, who the code writers are, and

who controls the code writers.”

The Politics of Control

The number of government players involved in the control and development of the

Internet within China problematize the formulation and implementation of media

policy in this competitive environment9. The ministries involved included the former

Ministry of Post and Telecommunication, the former Ministry of Electronics Industry,

the former Ministry of Radio Film and Television, Xinhua News Agency, Propaganda

Department of the CCP, and the Chinese Academy of Science. To counter the internal

competition between government players the Ministry for Post Telecommunications

and the Ministry for Electronics Industries and the Ministry for Radio Film (MRFTV)

and Television was amalgamated to form the Ministry of Information Industry (MII)

in March 1998. The MRFTV was relegated to the level of State Bureau.

9 See Appendix III for the entities involved in Internet Regulation in China.

Sniffer Packets & Firewalls 51

The Ministry of Information Industry (MII) has overseen the development of the

Internet, but responsibility was divided between the MII and the State Council

Information Office (SCIO) in 2000. The MII will continue to control Internet Service

Providers (ISP) and the infrastructure, and the SCIO is to be responsible for content.

In April 2000 the SCIO set up the Internet Information Management Bureau to

oversee and regulate Internet Content Providers (ICP), headed by Wang Qingcun,

previously a senior official with the SCIO. There are plans to replicate this bureau at

the provincial level as well. In addition, the State Administration of Radio, Film and

Television (SARFT) and the Ministry of Culture still have an interest in the

development of the Internet, as does the Netnews Bureau of China Internet

Information Centre, which is also run by the State Council. However, the MII is still

able to assert influence over content through the control and regulation of ISP. This

restructure reflects the traditional Chinese political methods of dividing authority and

responsibility.

In 2001 the Informationization Leading Group was established by the State Council to

co-ordinate the government stakeholders, and to settle disputes among them, but its

ultimate goal is to ensure that various policies “serve the interests of the state, rather

than the limited interests of a specific government ministry” (Tan & Wu, 2002, p. 18).

Tan writes:

In summary, the three kinds of decision-makers have their own characteristics. The Leading Group for Informatization is a political ‘task force’ that is led by China’s top leaders and is closely tied to the agenda of these top political leaders. Its power of coordinating and influencing other agencies and ministries are mostly political, which includes the nominations of ministers. The inter-ministry commissions, the State Development and Planning Commission and the State Economic and Trade Commission mostly rely on their control of funding for the entire industry to influence the ministries and corporations. Ministries and other agencies implement their agendas through publishing regulations and issuing operation licenses to control corporations and individuals (Tan & Wu, 2002,p. 19).

Sniffer Packets & Firewalls 52

Figure 1 below shows the complexities in the structure of decision making with

regards to the Internet. The State Council is the highest party organ of power and

administration.

Figure 1 shows the structure of decision-making

(Tan & Wu, 2002,p. 18)

The table 3 shows the levels of Government and policy responsibilities with regard to

the Internet, and e-commerce. The table highlights the complexity of the policy

formulation environment and comes from a paper by Alex Zixiang Tan.

Sniffer Packets & Firewalls 53

Table 3 State organs and their Internet responsibilities and ecommerce.

(Tan & Wu, 2002, p. 19).

Filtering: The Technical Means Of Censorship

The Internet in China is heavily filtered and the systems and strategies used to do this

are very sophisticated and are precise enough to block exact types of information. The

Golden Shield Project started in 1998 to manage and oversee the technological

aspects of Internet management. The project is owned by the Ministry for Public

Security (MPS) and was to be completed in 2006. Greg Walton (2001, p. 16) in his

report for Canadian based Human Rights, argues that the purpose of the Golden

Shield is to:

…build a nationwide digital surveillance network, linking national, regional and local security agencies with a panoptic web of surveillance. Beijing envisions the Golden Shield as a database-driven remote surveillance system – offering immediate access to registration records on

Sniffer Packets & Firewalls 54

every citizen in China, while linking to vast networks of cameras designed to cut police reaction time to demonstrations.

The filtering of certain subjects is consistent. The list of banned topics includes Falun

Gong, Democracy, the Dali Lama and Tibetan or Taiwanese independence. The

blocking of websites though is not consistent and is not uniform. The architecture of

Chinese networks has been structured to filter the content of the web at multiple

locations as it is viewed within the PRC10.

The Chinese have created a two-tier system of Interconnecting Networks and Access

Networks. There are 8 Interconnecting Networks which are connected to the global

networks of the World Wide Web, and these are closely connected to government

agencies. The Access Networks are the same as ISPs in the West, and they are not

legally able to directly connect to the global Internet, but do so through

interconnecting networks. There is quite a high level of competition between ISPs in

the cities (Tan & Foster, 1998, p. 20). By restricting the number of Internet Service

Providers (ISP) able to connect to the global networks that make up the Internet, it is

theoretically easier to filter or to block sites that are deemed unsuitable by the CCP

(Tan, Foster, & Gordon, 1997). The limiting of connection points to the global

networks has created bottlenecks in the system and they can act as a gate and a point

at which filtering can occur.

In addition to the creation of bottlenecks it appears that filtering capabilities have

been physically incorporated into the networks. There have been reports that “Cisco

specifically designed and developed a special router/firewall box for China” ("Internet

Filtering in China in 2004-2005: A Country Study," 2005). Cisco has also provided

routers which have packet filtering capabilities, and while these routers were designed

to combat different kinds of Internet attacks such as viruses and worms they can still

be used to block content ("Internet Filtering in China in 2004-2005: A Country

Study," 2005, p. 7). When information is sent across the Internet it is broken into

packets and is then sent to routers in the network. Routers are computers that send the

packets of information from one point in the Internet to the next. The routers provided

10 For a list of banned words see Appendix V.

Sniffer Packets & Firewalls 55

by Cisco can be used to intercept information as well as perform keyword searches

("CHINA: Volunteers help Beijing control Internet ", 2006b).

In 2002 reports began to emerge in the western press that Chinese authorities were

using packet sniffer software to filter Web-based email and Internet sites. Packet

sniffing software programs are used to monitor networks, and are programmed to

capture packets containing specific information (Tyson, 2006). It is interesting to note

that in the USA the Federal Bureau of Investigation (FBI) developed its own program

called Carnivore for the purpose of electronic surveillance. This project was

abandoned in 2005 for other forms of surveillance ("FBI Tosses Carnivore to the

Dogs," 2005; Tyson, 2006).

The effectiveness of China’s filtering system has been tested by the OpenNet

Initiative (ONI), a collaborative research project aimed at investigating and

challenging filtering and surveillance practices of countries known to filter the

Internet. ONI is made up of very prestigious institutions, the University of Toronto,

Harvard University, Cambridge University and Oxford University. They examined

the level of filtering and the effectiveness of circumvention technology and identified

China’s system as one of the most sophisticated.

ONI’s extensive report on filtering in China in 2004-2005 argues that China’s system

of filtering the net is “the most sophisticated in the world”("Internet Filtering in China

in 2004-2005: A Country Study," 2005). According to the report, filtering is carried

out at an assortment of control points and changes over time("Internet Filtering in

China in 2004-2005: A Country Study," 2005, p. 3), and while certain topics are off

limits many websites from American media outlets are usually accessible.

The blocking of foreign websites is at times arbitrary. According to ONI, Britain’s

BBC News Online is consistently blocked and accessibility to sites such as CNN and

Time magazines is inconsistent ("Internet Filtering in China in 2004-2005: A Country

Study," 2005). Sometimes they are available and sometimes they are not. The

Australian ABC website became inaccessible from within China in April 2002, in

what appeared to be a routine crackdown. Following protests by the Australian

government the website was restored. It appears that the website was either caught up

Sniffer Packets & Firewalls 56

in a routine crackdown, or it was in response to an impending visit by the Dali Lama

("ABC Online gets China's okay," 2002). What this incident might also suggest is that

there is something about China’s relationship with Australia that led to the restoration

of the site, also suggested by the fact that it was available in the first place. As I

mentioned earlier the BBC’s news services appears to be almost permanently blocked.

ONI concludes that:

Importantly, China’s filtering efforts lack transparency: the state does not generally admit to censoring Internet content, and concomitantly there is no list of banned sites and no ability for citizens to request reconsideration of blocking, as some other states that filter provide. The topics defined as sensitive, or prohibited, by China’s legal code are broad and non-specific, and enforcement of laws such as the ban on spreading state secrets discourages citizens from testing the boundaries of these areas. China’s legal and technological systems combine to form a broad, potent, and effective means of controlling the information that Chinese users can see and share on the Internet ("Internet Filtering in China in 2004-2005: A Country Study," 2005, p. 59).

Pressure has also been put on large international search engines such as Google,

Altavista, Microsoft’s MSN and Yahoo to censor content for Chinese audiences. In

the case of Google this pressure began with disruptions to access of the site from

within China. In 2002 the site was blocked for a week and since then it has been

sporadically banned or requests for the site would be redirected to search engines that

are sanctioned by the CCP. The Berkman Center for Internet & Society Harvard Law

School, which is a part of the ONI research group carried out research on the

accessibility of Google in 2002. They found that:

Current testing suggests that filtering may vary across China. Some parts of China may not filter Google keywords at all, while other parts may disconnect a user’s Internet connection (even an "always-on" high-speed connection) in response to a search for a prohibited term. Prohibited terms seem to include “Jiang Zemin” and “cache”; the latter is typically associated with requests to use Google’s system for viewing archived content from other web sites (Berkman Center for Internet & Society Harvard Law School, 2002).

In response to this pressure, Google and other international content providers such as

Yahoo and MSN have conformed to the wishes of Chinese authorities. All three

Sniffer Packets & Firewalls 57

companies have, as a result of conforming to filtering content, come under a lot of

criticism in the USA. In 2004 Google defended their actions by saying that is was

better to remove banned material in order to improve the experience for Chinese

users. A company spokeswoman Debbie Frost said at the time that “Google has

decided that in order to create the best possible search experience for our mainland

China users we will not include sites whose content is not accessible” ("CHINA:

Google conforms to censorship," 2004).

In January 2006 Google launched a search engine in China amidst criticism for

censoring results and this time they argued that they were complying with the law of

the country. In a statement to CNN Google stated:

In order to operate from China, we have removed some content from the search results available on Google.cn, in response to local law, regulation or policy. While removing search results is inconsistent with Google ‘ s mission, providing no information (or a heavily degraded user experience that amounts to no information) is more inconsistent with our mission (Loren, 2006).

Microsoft, Yahoo and Google operate within a paradox that requires different

demands in different locales. In China they are willing to comply with the

Governments wishes for censorship, and in the USA these companies have actively

defied Government’s requests for details of user information. In December 2005 the

United Attorney General sought data from Yahoo, Google and MSN on user activity

in order to defend the Child Online Protection Act in the Federal Court in

Pennsylvania. Google has refused to comply with the requests (2006). The World

Privacy Organisation suggests that if the search engines are forced to comply then the

Internet could possibly become the world’s largest surveillance tool (2006).

Regulations

The main feature of Chinese Internet regulations is that they promote self-censorship

at every level, and loosely define the parameters of Internet activity. This is done by

making the user, the ICP, and the ISP responsible for the content that is posted on

Sniffer Packets & Firewalls 58

websites, chatrooms, blogs11, and BBS12. The regulations promote ISP and content

providers to monitor and censor what is posted on websites, blogs, and BBS. Under

the regulations concerning Internet café owners are also meant to monitor customers.

The State Council approved the first regulations that attempted to control the content

of the Internet in China in December 1997 (Zhang, 1997). The regulations are based

on the desire to protect computer networks in China from hackers, and as the CCP

puts it "to preserve the social order and social stability" (Chinalaw Home Page, 1999).

It is these regulations that loosely define what is and what is not permissible, and this

includes pornography and sites that are deemed to incite the people to overthrow the

government or the socialist system, inciting division of the country, harming national

unity, or sites that promote terrorism, and feudal superstitions ("Cult hinders viewers

seeing media reports," 2003). The regulations also stipulate that all users must register

with the Ministry of Public Security though this does not appear to be enforced.

The regulations concerning the Internet were updated three times during 2000, which

suggests that there was some debate on how to deal with the Internet within the ruling

elite. The State Secrecy Protection Regulations For Computer Information Systems

promulgated in January 2000 are primarily concerned with security issues, but they

also outline some of the issues pertaining to the publication of news by privately

owned websites and portals. These issues were dealt with more specifically by the

draft regulations Management in Regard to Internet Content Provision handed down

by the State Council ("State Council approves new rules on Net content, telecom,"

2000). These regulations encourage self-censorship because the owners of websites

and portals are responsible for what is posted on sites, and this has led to the

employment of people to specifically observe what is posted in Chatrooms and on

Bulletin Boards.

In September 2005 Internet regulations were updated again with the introduction of

The Administrative Regulations of Internet News Information Service. These

regulations were issued by the State Council’s Information Office and the Ministry of

11 The regulations pertaining to weblogs (blogs) will be discussed in more detail in Chapter eight. See also Appendix III.12 See Appendix II for regulations on BBS and Chatroom.

Sniffer Packets & Firewalls 59

Information Industry (Song, 2006). The focus of these regulations is to enhance self-

censorship of content providers by making them responsible for what is posted on

websites, including weblogs and BBS. These regulations also further define news and

who can produce and disseminate it. According to Song Huang and Chen Lingli

(2006):

In general, only news agencies directly under the supervision of the central government, provinces, autonomous regions, directly-administered municipalities, or municipalities where provincial governments are located, are qualified to apply to the State Council’s Information Office for approval to establish an entity engaging in Internet news information services or the publishing of original news information.

In addition to reinforcing self-censorship the regulations also help to ensure that news

comes from official sources. The effect of this is to reaffirm Beijing’s authority over

the management of public discourse and the flow of information.

Internet Cafés

The CCP has paid a lot of attention to Internet cafés, as 33% of Chinas netizens

accessed the Internet via cafés (See CNNIC report for January 2008)13. The regulation

and surveillance of Internet cafés adds another layer to the matrix of management

strategies employed by the CCP to manage the flow and types of information that are

available in Chinese cyberspace. The strategies for cafés are the same as the broader

strategies for managing the web: regulation, self-censorship and surveillance. The

justification for the management is also the same: network safety and security.

Essentially, this means café owners are meant to monitor what patrons are accessing

during their sessions. Patrons are also meant to register with the cafés using official

forms of identification. During my field work I was only asked to register when I

went to large cafés. The justification for the management of Internet cafés is the same

as other forms of Internet regulations and that is network safety and security.

13 Internet café regulations are discussed in more depth in Chapter nine.

Sniffer Packets & Firewalls 60

Children under 16 are banned from Internet cafés following the introduction of

regulations in 2002 aimed specifically at cybercafés. These regulations followed the

deaths of some teenagers in a fire at an Internet café in Beijing. The fire was the

impetus for many of the regulations of Internet café, and again the emphasis was on

public safety. In May 2006 a crackdown on Internet café and bars was aimed at

keeping youths out of these places ("CHINA: Beijing launches Internet cafe

crackdown," 2006). This is discussed in more detail in chapter 9 on online games.

During field work in 2002 I regularly went to a large Internet café at the top of the

Wanfujing Bookstore. It was during school holidays and the majority of patrons were

teenagers and most appeared to be playing online games. I also visited a number of

other Internet cafés throughout the city, and most were patronised by teenagers

playing online games. Friends that live in the city tell me that Internet cafés regularly

come and go. They open and then are closed by authorities.

The Internet Police and Other Hit Squads

To further backup the technological and regulatory strategies of supervising Internet

activity there is an army of Internet Police. The exact number of Internet Police is

unknown, however it was estimated in 2004 that there are approximately 40,000

(Mooney, 2004). I have at this stage not been able to find more up to date figures for

the number of Internet police operating throughout China. The figures are often

quoted in the Western press as being between 30,000, and 50,000 ("CHINA:

Volunteers help Beijing control Internet ", 2006b). The details about who makes up

this army of police are also sketchy, and this may include the army of volunteers who

also help with Internet surveillance. The Peoples Daily Online reported on the

establishment of China’s first Internet Police in Anhui province in 2000 ("Chinese

Internet Police," 2000). In the report the head of the Anhui Internet Police said “the

main task of the group is to administrate and maintain order on computer networks”

("Chinese Internet Police," 2000).

In 2006 The Internet Security and Surveillance Division of Shenzhen Public Security

Bureau created two cartoon characters to appear on websites and web forums in

Shenzhen. The characters are called Jingjing and Chacha and the names are made up

Sniffer Packets & Firewalls 61

from the word police, ‘jing cha’ (警察), in Chinese. The purpose of these characters is

to scare users into complying with Internet regulations. Jingjing and Chacha are

pictured below (Qiang, 2006). Users can click on the icons for information on Internet

regulations (Yan, 2006).

Figure 2 Jing Jing and Cha Cha China’s Internet Police

In a story on Jingjing and Chacha in the Beijing Youth Daily The Internet Security and

Surveillance Division of Shenzhen Public Security Bureau was quoted as saying:

The Internet police has existed for a long time. This time we publish the image of Internet Police in the form of a cartoon, the purpose is to let all Internet users know that the Internet is not a place beyond of law, the Internet Police will maintain order in all online behaviours (Qiang, 2006).

The director also said that “the main function of Jingjing and Chacha is to intimidate,

not to answer questions” (Qiang, 2006). The story was translated by China Digital

Times, a prestigious site that collects and translates news stories from China and is run

by the Berkeley China Internet Project.

In May, 2006, it was announced that The Ministry of Public Security deemed Jingjing

and Chacha a success and their virtual patrol program was to be extended to eight

other cites. According to a report by Xinhua the cartoon cyber cops “have received an

Sniffer Packets & Firewalls 62

accumulated 100,000 clicks, provided more than 600 legal consultations and received

more than 1,600 reports on online crimes, 235 of which have been proved effective”

(Yan, 2006). The report also claims that the appearance of Jingjing and Chacha had

reduced the amount of hazardous information on Shenzhen’s major websites by 60%

(Yan, 2006). Security guards will also patrol inside chat rooms and delete information

that is deemed as harmful (Cai, 2006).

The use of the Internet to facilitate self-censorship and the active participation of

private citizens in the surveillance of other private citizens is nothing new. ISP’s

could report activity and ICPs that were involved in illegal activities. It was reported

at the time that the site had “received more than 143,000 complaints, of which 67.5

percent relate to pornographic material, 4.4 percent to cult activity, 3.4 percent to

online fraud, 1.9 percent to online gambling, and 1.6 percent to intellectual property

rights infringements” (Q. Chen, 2005).

When these things are reported in the Chinese media it is interesting to note that

details of the crimes are those that involve gambling and pornography and not

political dissent. Conversely in the Western media the reporting of arrests or criminal

activity in China as it relates to the Internet is more commonly associated with

political dissent. Each story or version of Internet crime as it appears in China is

consistent with the view of its particular sphere of influence, Chinese cyberspace, or

western, or rather English language cyberspace.

The Development of Content

The development of content is not only managed through regulation, it is also

managed through campaigns aimed at self-censorship and through creating a presence

in Chinese cyberspace. These campaigns and the development of content in general

are about the defining of the monopoly of knowledge in the construction of time as a

version of reality defined and sanctioned by the CCP that is used to manage space,

both physical and cyber. Campaigns, such as the Civilized Internet Program in 2006

where volunteer students are recruited to watch their classmates in chat rooms and

online forums, as well as to promote ‘politically suitable’ topics for discussion

("CHINA: Volunteers help Beijing control Internet ", 2006a), are used to help ensure

that the government’s voice in this space is the most prominent. In addition to

Sniffer Packets & Firewalls 63

surveillance there is another kind of Internet Police who pose as commentators in

Chatrooms and other web forums to promote the government’s view, and this forms a

part of the development of content. The army of pro government commentators are

known as the ‘Fifty Cent Party’ the ‘Red Vests’ and the ‘Red Vanguard’. According

to David Bandurski (2008a, n.p.) the army of commentators has:

just one mission: to safeguard the interests of the party by infiltrating and policing a rapidly growing Chinese Internet. They set out to neutralize undesirable public opinion by pushing pro-partyviews through chat rooms and web forums, reporting dangerous content to authorities.

The estimated 280,000 strong army of commentators, trained by the Ministry of

Culture, was described by Hu Jintao as being part of a ‘new pattern of public-opinion”

(Bandurski, 2008a, n.p.). On January 23 2007 Hu Jintao (Bandurski, 2008a, n.p.) said

that party leaders should “assert supremacy over online public opinion, raise the level

and study the art of online guidance, and actively use new technologies to increase the

strength of positive propaganda”, and that the Party needed to “use” the Internet as

well as control it. Renowned Chinese Blogger, Issac Mao (in Bandurski, 2008a, n.p.),

commented that “the goal of the government is to crank up the ‘noise’ and drown out

progressive and diverse voices on China’s Internet, This can be seen as another kind

of censorship system, in which the Fifty Cent Party can be used both to monitor

public speech and to upset the influence of other voices in the online space.”

Increasingly the CCP is turning to PR spin methods in order to develop content. An

example of this was in June 2008 when President Hu Jintao took part in an online chat

with a member of the general public. The first question he answered was on his

Internet activities and whether or not he looked at the Internet everyday. Web users

watching the interaction online began searching for the identity of the citizen who

identified themselves as ‘Picturesque Landscape of Our Country’ and they turned out

to be a member of the ‘Fifty Cent Party’ as discussed in chapter 4.

Other types of programs that promote the government’s view point have sought

pledges from Internet content providers. These campaigns have been aimed at ICPs

in a bid to ensure self-discipline or to gain public agreements to self-discipline. In

Sniffer Packets & Firewalls 64

2002 ICPs signed an agreement to “control” the material published on their sites

("China internet firms 'self-censoring'," 2002, n.p.). In April 2006 43 websites in

Beijing signed a pledge to self censor, and as a result more than 2000 chat rooms

were closed and millions of online comments were deleted (Cai, 2006).

In April 2007 a campaign to promote the use of the cn domain name was launched,

supported by the Ministry of Information and the Information Office of the State

Council, State Commission Office for Public Sector Reform and the Academy of

Sciences. The ‘One Million Websites Using Chinese Domain Names’ program was

officially launched by China Internet Network Information Centre (CCNIC) the body

responsible for allocating domain names in China ("CNNIC Urges Websites To Use

CN Domain Name," 2007). The story appeared on the Internet Society of China’s

website says that many officials believe that “China’s Internet security is best

maintained by the use of cn domain names because China has more direct control

over those top-level domain name servers and registrars, while China has very little

control over .COM or other TLD services” ("CNNIC Urges Websites To Use CN

Domain Name," 2007). According to the Internet Society of China, CNNIC reported

that “about 53% of Chinese netizens believe that giving priority to developing Internet

services within a native language environment will help promote the development of

the country’s Internet business” ("CNNIC Urges Websites To Use CN Domain

Name," 2007).

The interesting thing to note about these campaigns is that they are consistent with the

style of campaigns used in China to manage all number of things. In a way it is like

public theatre, in that it shows that people and organisations support the government.

It puts the desired spin on events and modes of management, for example campaigns

to combat HIV/AIDS as discussed in chapter 5, and Learn from Lei Feng campaigns

that are outlined in chapter 9.

A limit on foreign investment in the media is another strategy adopted by the CCP to

manage the flow of information and to shape content. Foreign investment in Chinese

media, including the Internet, has been confined to joint ventures. This enables the

government to limit foreign influence on Chinese media, while continuing to enable

the CCP to shape and maintain Chinese cyberspace.

Sniffer Packets & Firewalls 65

The shaping of Chinese cyberspace also extends to the development of content. In

March 2000 Xinhua reported the first official news website was launched,

www.21DNN.com.Thsi 21 Dragon news. The site brought together nine official and

prominent Beijing news websites including: the Beijing Daily, Beijing Youth Daily,

Beijing Evening News, Beijing Economic Daily, Beijing TV Station Group, Beijing

People’s Broadcasting Station, Beijing Cable Broadcasting Station, Beijing Morning

Post and the Beijing Broadcast and TV Weekly ("China's First Authorized News

Website Launched," 2000).

The level of investment in the provision of content has logically extended to the

development of online games, given that 59.3% of China’s netizens play online games

((CNNIC), 2008)14. In April 2006 the Government announced plans to invest 2 billion

dollars in the development of online games. According to a BBC news report Chinese

gamers paid 500 million dollars to subscribe to online games in 2005 (R. Taylor,

2006). Part of the reason for this kind of investment has been to ensure that certain

features appear in the games that are commensurate with the government’s desires for

this sector and this is covered in more detail in chapter nine. There are concerns in

China as there is in the Australia about the effects that games have on players long

term. The features that are added to the games are things like a fatigue system where

the game is designed to run down after a certain number of hours of play (R. Taylor,

2006).

Breaking through the Great Firewall

The West is very big on berating China for failing to take up western style democracy

and there are campaigns that have been taken up by western governments to counter

Chinese efforts to censor the web. For instance the Safe Web Project. In 2001 the

international broadcaster Voice of America VOA and the CIA’s venture capital arm

In-Q_Tel, invested in Safeweb to develop software called Triangle Boy, designed to

assist Internet users in authoritarian countries such as China to anonymously access

proxy servers to circumvent surveillance systems. Not long after news of Safeweb

was announced, reports emerged that access to Safeweb in China had been blocked.

14 Chapter nine covers online games.

Sniffer Packets & Firewalls 66

In an ironic twist the BBC reported that Safeweb and VOA had put a filter on the

server side to censor pornography, and that would have included homosexual rights

pages (Hennock, 2002). The project was suspended in 2002.

Another example of the west putting pressure on China’s Internet policies include the

2007 Yahoo settlement of a lawsuit with a Chinese journalist, Shi Tao, and cyber

dissident Wang Xiaoning, who are both serving 10 year jail terms. The settlement was

seen as a response to pressure from the USA House Foreign Affairs Committee. The

Committee’s Chairman Tom Lantos, a Democrat, described the actions of Yahoo as

“inexcusably negligent behavior at best, and deliberately deceptive behaviour at

worst” (Mendoza, 2007). The lawsuit was launched by the World Organization for

Human Rights USA on behalf of both the activists. They alleged the company

‘willingly’ provided their e-mails and personal information to the Chinese

government, which led to them both being jailed. Shi was arrested in April 2004 for

‘leaking state secrets’ in emails he sent to the Minzhu Luntan dissident website

revealing details from the propaganda department’s directives to media outlets on

how to cover the 15th anniversary of the 1989 Tiananmen Square incident (Mendoza,

2007, n.p.). Wang was imprisoned “for ‘incitement to subvert state power’ after he

posted a message on a Yahoo ! Group about the necessity of democratic reform”

(Mendoza, 2007, n.p.).

Whilst the regime’s strategy of containment of the Internet in terms of filtering, legal

measures and the development of content are successful in moulding the identity of

Chinese cyberspace, the technology also allows for circumvention of the official CCP

version of events. The consequence is that there have still been incidents that the CCP

has had to respond to, and it is the investigation of these incidents that provides an

insight into the formation and operation of marginal groups within the PRC. It also

sheds light on the way these things are viewed in China and in the West. The

government of the United States of America is active in putting pressure on China to

discontinue its policies of censorship and has in the past sought to directly undermine

attempts to censor the web. For example in the lead up to the Beijing Olympics the

USA pressured China to allow journalists in the city unfettered access to the Internet

Sniffer Packets & Firewalls 67

during the games ("Defiant China hits out at US, stands firm on Internet," 2008).

Activist groups in the USA have also been active in developing software to help

Chinese citizen’s circumvent the Great Firewall, and this is explored more fully in

chapter 6. These examples also highlight the interplay of spatial relationships between

the United States of America and the PRC and are a visualisation of the tensions and

the negotiations that go on between the China and the west.

Conclusion

This chapter has outlined the strategies used by the CCP to maintain and develop the

monopoly of knowledge and manage the flow of information across Chinese

cyberspace. The strategies include the use of regulations, the development of content

and the use of code to censor the Internet in the PRC. These strategies are used by the

leadership of the CCP to reinforce their position as the central power of the PRC and

to exert influence over local and provincial governments at the margins.

Sniffer Packets & Firewalls 68

Chapter 5

Official/Unofficial: The Management of Non Government Organisations

The Internet and the development of Non Government Organizations (NGO) have

enabled the formation of associations of people around a myriad of interests. At the

end of 2006 there were an estimated 354,000 NGOs according to the Ministry of Civil

Affairs. However according to Jia Xijin, an associate professor in the School of

Public Policy and Management at Tsinghua University, the real figure was likely to be

more than 1 million (Guan, 2007, n.p.). The Internet has enabled these groups to

organise and exchange ideas, and these developments are often pointed to as the

beginnings of a civil society, a prerequisite for democracy. This chapter looks at the

concepts of civil society and the public sphere and the way that official and unofficial

discourses such as public debate are managed. It is my contention that the concepts of

civil society and the public sphere are inadequate for understanding the way in which

informational flows are managed as a consequence of the development of the Internet.

I will begin by looking at the concept of civil society and its application to the

opening of the economy and the Internet in China. I will argue that the concepts of

state corporatism, corporatism and bureaucratic authoritarianism are more appropriate

for understanding the strategies used to manage information flows and the shaping of

official discourse. As a way of supporting my claims I will then look at the way that

official discourses are managed through NGOs, specifically those that are based on

the environment and HIV/AIDS. I will confine my discussion to the overall

management of environmental and HIV/AIDS NGOs. Because there are so many of

these groups it is beyond the scope of this chapter to investigate them in depth and it

would constitute a PhD in its own right. I will then contrast the official discourses

with the unofficial discourses in the form of an event in Huaxi/Huankantao where

riots occurred in response to pollution and the reporting of an HIV/AIDS activist and

her blog in the PRC.

Civil Society and the Public Sphere

The formation of NGOs and the networking capabilities of the Internet in China is

often given as evidence of the beginnings of a ‘civil society’, and an emerging public

sphere, and both of these are seen as a fundamental precondition for democracy. The

Sniffer Packets & Firewalls 69

discourse in China on the concept of civil society has led to a reinterpretation of

Marxism by Chinese scholars (Ma, 2005, p. 22)15. Indeed, much of the scholarship

concerning the Internet in China uses theories of civil society as a framework, and

they are influenced by Habermas’s notion of the public sphere and civil society inside

and outside of China (Tai, 2006; X. Wu, 2006; Yang, 2003a, 2003b; Yongming Zhou,

2006). In general the arguments here are that the Internet is providing the means to

transform China’s political culture from the bottom up through the creation of a space

in which groups can form and have the potential to influence the government. It is in

this sense that the Internet is seen as a public sphere that is a democratizing force. Wu

uses the notion of public sphere to explain the emergence of a non official ideology of

nationalism that is articulated on the Internet in China. Goubin Yang argues that the

Internet and civil society form a nexus of mutual benefit. He states that “the Internet

facilitates civil society activities by offering new possibilities for citizen participation.

Civil society facilitates the development of the Internet by providing the necessary

social basis-citizens and citizen groups-for communication and interaction” (Yang,

2003a).

These notions of civil society and the public sphere are closely associated with the

work of Jurgen Habermas who looked at the formation and articulation of public

opinion and debates in 18th century Western Europe. Habermas wrote that “by ‘the

public sphere’ we mean first of all a realm of our social life in which something

approaching public opinion can be formed. Access is guaranteed to all citizens. A

portion of the public sphere comes into being in every conversation in which private

individuals assemble to form a public body” (Habermas, 1974, n.p.). Habermas traced

the materialization, transformation and collapse of the public sphere as a consequence

of a highly commercialised mass media that reshaped and confined political

discussion to the media. According to Habermas, public opinion was formed through

face to face discussions in coffee houses over newspapers; now the articulation of

public opinion and discussion is confined to the media itself. Habermas (1989, p. 103)

states:

15 Ma provides excellent background debate in both China and the West on the civil society and its application to NGO activity in China.

Sniffer Packets & Firewalls 70

The sounding board of an educated stratum tutored in the public use of reason has been shattered; the public is split apart into minorities of specialists who put their reason to use nonpublicly and the great mass of consumers whose reception is public but uncritical. Consequently, it completely lacks the form of communication specific to a public.

It is worth noting at this point that Habermas’s theory of a public sphere is similar to

Innis’s appraisal of the ancient Greek’s oral tradition which emphasised discussion.

Both writers saw the periods on which they wrote as golden ages in the history of

thinking and culture and both looked at the relationship between modes of

communication and the cultural changes that they facilitated. Innis (1951) argued that

the oral tradition in Greece fostered thinking that was flexible, rather than a point of

view that was tied to the dogma of a written script, such as the codification of laws.

He contends that Greece made the written language subordinate to the demands of

their oral traditions and in doing so enabled the flourishing of Greek culture at that

time; the influence of which is still felt in the West to this day. Innis (1951, p. 65)

writes that “the power of the oral tradition in Greece which checked the bias of a

written medium supported a brief period of cultural activity such as has never been

equalled”.

Definitions of civil society are much more hotly contested, and this in itself raises

some of the problems with the concept. The London School of Economics, Centre for

Civil Society provides a definition that is widely accepted as the seminal definition

("What is civil society?," 2004, n.p.),

Civil society refers to the arena of uncoerced collective action around shared interests, purposes and values. In theory, its institutional forms are distinct from those of the state, family and market, though in practice, the boundaries between state, civil society, family and market are often complex, blurred and negotiated. Civil society commonly embraces a diversity of spaces, actors and institutional forms, varying in their degree of formality, autonomy and power. Civil societies are often populated by organisations such as registered charities, development non-governmental organisations, community groups, women’s organisations, faith-based organisations, professional associations, trades unions, self-help groups, social movements, business associations, coalitions and advocacy groups.

This definition deemphasises power relationships that are embedded in the potential

formation of civil society groups in authoritarian countries, where these groups are

Sniffer Packets & Firewalls 71

only allowed to exist with government sponsorship, legal or financial. A broad based

definition of civil society based on voluntary associations deemphasises the political

nature of the interactions of these groups and fails to account for the inbuilt inequality

in these interactions. The definitions based on voluntary associations are too broad as

this could include sporting clubs and groups outside the law such as triads, or gangs

(Ehrenberg, 1999, p.235-236; Rodan, 2003, p. 506). The problem with civil society is

that it diffuses attention away from unequal power relationships that are inherent in all

political interactions, whether these groups are able to influence the government or

not. The concept of civil society is deterministic in its assumptions about the ability of

people to organize associations and the inevitability of a form of pluralistic

democracy in that it overlooks the restrictions and regulations that are placed on the

formation of associations, particularly in the case of authoritarian countries such as

China. The tracing of centre/margin relationships provides a better framework for

negotiations of influence and power as it assumes that these contests are unequal from

the start and that they are under constant arbitration, resulting in wins and losses on

each side.

Guobin Yang argues that the Internet has helped to establish the beginnings of a civil

society in China and points to growth in voluntary organisations that are beyond the

reach of the government as evidence of the emergence of a civil society. Yang writes

that (2002);

The existence of voluntary civic organizations outside the control of the state is an important basis of democracy. In China, civic organizations have proliferated in recent years, yet they hardly fall outside state control. Even some self-proclaimed NGOs cannot claim sufficient autonomy. Again, the Internet is proving to be an important tool for these organizations. Officially registered environmental NGOs rely heavily on the Internet to advance their causes. A growing number of web-based environmental groups have appeared in the past five or six years. They are unable to register because of the constraints of the regulative climate. Some of these groups started as virtual communities before evolving into web-based voluntary organizations. Others first organized offline and then went online. In all cases, the Internet provides a space for ordinary citizens to organize and act collectively. This was unimaginable even as recent as ten years ago.

The inability of these groups to register means that their influence is also limited and

to some degree has the potential to impair their mobilization, as they could be made

Sniffer Packets & Firewalls 72

illegal at any time and forced to cease their activities or move their operations

underground. Unregistered groups may lack legitimacy in the eyes of the state and

this marginalises these groups and their activities, even though these groups only exist

because the government has allowed it. The Falun Gong case and the ongoing

campaigns to prevent the return of the organisation makes it abundantly clear that if

the government wishes to ban an organisation and remove it from the ‘public sphere’

it is quite capable of doing so. The degree to which unregistered groups are able to

forge links (guangxi 关系) with the government is unclear and this also presents a

problem for any sort of evaluation of the effectiveness of these groups.

In terms of using the Internet as the basis for a civil society the CCP has sought to

manage the flow of information to prevent the formation of groups that would

seriously challenge their role and political authority. The argument I am trying to

make here is similar to the one made by Gary Rodan in relation to Singapore, where

the government there has also been very successful at preventing the formation of an

effective opposition to the ruling Peoples Action Party (PAP). Rodan (2003, p. 503)

argues that:

In contrast with some other parts of Southeast Asia, challenges to media controls in Singapore have been limited and ineffectual. Lately the government has been refining legislation to try and keep it that way. But this strategy is not principally based on the unrealistic objective of direct information control. Rather, preventing the emergence of organized social and political forces that could lead to a genuine civil society lies at the heart of the strategy.

There is the emergence and formation of groups in China independent of the

government and to some degree they are autonomous. However the degree to which

they are regulated by the CCP means that they are managed and shaped so that these

groups conform to the CCP’s monopoly of knowledge and view. In addition many

registered NGOs cultivate state relationships as a means of sustaining their operations.

There are other NGOs actually organised by the state and these are referred to as

Government Organised Non Government Organisations or GONGOs, Ma Qiusha

(2005,p. 97) writes that “ironically NGOs have tried to become more independent by

holding on to their relationships with the government ….[They] often have to rely on

Sniffer Packets & Firewalls 73

government’s authority to increase the size and influence of their projects.” The

problem with the application of the concept of civil society and the public sphere is

that it fails to adequately acknowledge the power relationships imbedded within these

institutional arrangements. This not is not to say that the way power in China is

exercised by the CCP totalizing and that there is no room for civic participation. Nor

does it imply that these groups are not the creation and visualisation of new spheres of

influence outside of the party. However, there are limits to what can be said and

clearly the CCP still define those boundaries. The application of civil society

overstates the ability of these groups to potentially challenge the government.

The formation and regulation of NGOs is more consistent with development theories

of state corporatism or corporatism and bureaucratic authoritarianism. Ma Qiusha

(2005) argues that the function of civil associations, since the emergence of NGOs in

the mid 1990’s, has evolved along both civil society and state corporatist lines. This

model acknowledges the kinds of relationship that is shared by the state and NGOs in

China. In a corporatist system the state usually channels the interests of a group into a

single organization. Jonathon Unger and Anita Chan (1995, p. 30) argue that “the

state determines which organizations will be recognized as legitimate and forms an

unequal partnership of sorts with such organizations. The associations sometimes

even get channelled into the policy-making processes and often help implement state

policy on the government’s behalf”. The corporatist model is likened to the Fascist

states of the 1930’s, where business and labour interests were subordinate to the state.

Japan, South Korea, Singapore and Tawain have all been described as corporatist in

earlier stages of their development. This is supported by the argument of Unger and

Chan (1995, p. 30):

Corporatism, moreover, usually involves more than just a working relationship between the state and the associations representing interest groups. An actively interventionist state often helps to organize the relations between the various sectoral organizations. It bases its intervention as a grand arbiter or mediator on the premise that the government is the guardian of the common good, of a national interest that supersedes the parochial interests of each sector. Yet within such a corporatist framework, the state does not attempt to dominate directly. It leaves some degree of autonomy to the organizations within each of their respective spheres of operation. But to ensure that the compacts and agreements achieved at the top get implemented effectively, it demands

Sniffer Packets & Firewalls 74

that the organizations exercise some discipline and control over their own memberships.

The strategy outlined above by Rodan is much the same as in the PRC, and this is not

surprising as China has often looked to Singapore for models of development and

containment of informational flows on the Internet. In terms of the development of

civil society and the limits of autonomy of civic association it is the CCP who still

defines the limits to any public discourse and they alone remain the final arbiters of

what can and cannot be said. Whilst the political process has opened up to some

degree there are limits to what can be said. The hosts of websites, Blogs, online

games, BBS and Chatrooms all conform to the boundaries set by the CCP in order to

remain in the market. In the case of voluntary and autonomous association this is still

largely dictated by the CCP. For example there are no trade unions that are

independent from the government. The corporatist model better explains the CCP’s

attempts to manage informational flows. Unger and Chan (1995, p. 32)write that

“harmony is the catchword of a corporatist system, regardless of whether this

harmony is truly consensual or imposed from above. And it is very often a goal-

oriented harmony, orchestrated to serve a national mission”. Hu Jintao’s concept of

‘social harmony’ echoes Unger and Chan’s sentiments, and the formation of NGOs

and their function in Chinese society as defined by the CCP is to support ‘social

harmony’.

The qualification that Ma (2005) makes in her argument about the formation of civil

associations and NGOs as consistent with both civil society and corporatist lines

enables her to account for CCP management and power relationships as well as the

emerging influence and role that these groups play in Chinese society. Ma (2005, p.

137)writes that:

The experience of Chinese associations indicates that the state has generated mechanisms for adopting profound economic and social structural changes in corporatist relations the state stills holds control. At the same time, associations, bottom-up ones in particular, are raising their voices in the implementation and even making of policy; there are clear indications that civil society is evolving.

Ma’s fusing of civil society and corporatism is similar to Innis’s notions of centre

margin relationships and the negotiation of a monopoly of knowledge and the

Sniffer Packets & Firewalls 75

management of time and space. Ma argues that this approach provides a better

explanation of the ways in which the CCP has sought to manage and contain NGOs

from the top down while at the same time explains the impact and formation of NGOs

from the ground up.

Small Government Big SocietyThe government encouraged the formation of NGOs and Non Profit Organisations

(NPO) in reaction to some of the consequences of the Open Door Policy and reforms

that were begun in 1978 under the slogan ‘Small Government Big Society’. Some of

the reasons behind the promotion of NGOs has been to help fill the gap that was left

in welfare services after the iron rice bowl16 was rolled back, and to help with

response to disaster relief. NGOs have also been useful to the government in the

development of the economy. Ma (2005, p. 47) says that “the government believes

that the resources, development program and services brought in or provided by the

non-governmental sector domestic or international will help the CCP restore its

legitimacy.” At the same time the CCP had sought to manage NGOs through

registration and regulation under the Ministry of Civil Affairs. Another role of NGOs

in China is to act as a conduit for discontent and directing complaints through official

channels. In the case of environmental groups their function has been to steer victims

of pollution through the courts, rather than riot in the streets.

Twenty years after the launch of the Open Door Policy, China sought to develop a

legal structure to deal with Social Organisations (SO) and in 1998 the first regulations

aimed at this sector were introduced (Ma, 2005, p. 76). Ma (2005, p. 77)argues that

“the current state of Chinese NGOs is shaped by the present political culture, the

party-states continuing intervention in the private sector, and the mixed influences of

Western ideas and traditional Chinese thoughts”. The official CCP NGO policy is one

of “nourishment, development, supervision, regulation (peiyu, fazhan, jiandu, guanli,

培育,发展,监督,管理) (2005, p. 69).

16 The iron rice bowl 铁饭碗 tiě fàn wǎn refers to the work unit system of lifetime employment that guaranteed housing and other benefits through employment in Sate Owned Enterprises (SOEs). The reforming of the economy has effectively ended this system.

Sniffer Packets & Firewalls 76

An example of how the government limits civic participation by NGOs was the

closure of the online journal China Development Brief and the civil society journal

Minjian in November 2007. Minjian was published under the sponsorship of the

social and citizenship development research center of Zhongshan University in

Guangzhou. Minjian’s publication license was withdrawn by the news publishing

bureau by the municipal government of Guangzhou in July ("China Raids Blogger's

Home, as Political Arrests Double," 2007).

The closures highlighted the precarious legal position that the publications of NGOs

are in. The journals had been operating without a publishing license (kanhao 刊号),

and this was the legal justification for the closure. However, thousands of NGOs run

publications without licenses. “In China all licenses for publishing are held by

sponsoring institutions, or zhuguan danwei ( 主管单位 ), that are responsible for

ensuring party propaganda discipline at publications under their watch” (Bandurski,

2007b, n.p.). Zhai Minglei the editor of Minjina stated;

all of the internal organizational publications and materials of NGOs in China are illegal publications . . . [a]nd so it is with all of those small booklets we circulate among friends and acquaintances in China as a form of interaction or to seek the appreciation of friends, or those various poetry collections we call people’s publications ( 民刊 ), all reading materials shared among colleagues. All they need is to be printed and they are illegal publications (Bandurski, 2007b, n.p.)

Zhai turned to his blog after the magazine was closed, his home was raided by the

police and his hard drive confiscated.

In another incident in November 2007 a website aimed at providing information and

contact for those with Hepatitis B was closed after six years of operation without any

meddling from the government ("China Raids Blogger's Home, as Political Arrests

Double," 2007). The website was owned by an NGO and the closure followed the

reclassification of the site as a healthcare service provider. The sites forums were

removed after recommendations were made by the Ministry of Health("China Raids

Sniffer Packets & Firewalls 77

Blogger's Home, as Political Arrests Double," 2007). Again, this illustrates the ability

of the government to silence critics when they have a will to do so.

NGOs Environmental GroupsThe state of China’s environment is one of the most serious problems facing the

country today and the CCP has widely promoted the Beijing Olympics as the Green

Olympics. In 2006 Zhu Guangyao, Deputy Chief of the State Environmental

Protection Agency, put the cost of environmental damage at USD $200 billion, 10%

of the country’s Gross Domestic Product ("Pollution costs equal 10% of China's

GDP," 2006). The environment was also identified as a problem by Hu Jintao (2007a)

in his report at the Report to the Seventeenth National Congress of the Communist

Party of China on October 15, 2007. The damage to China’s environment is now seen

as a serious threat to economic growth as well as a consequence of that growth and

development. In 1998 the government launched the ‘Three Green Project’ to develop

what it called a green market to promote green consumption ("Environmental NGOs

Encouraging Green Actions ", 2007). Pan Yue, Vice Minister of the State

Environmental Protection Administration, stated that, “the ultimate force to solve

China’s environmental problems lies in the public, or in another word, every ordinary

people [sic]. Chinese people are approaching the absolute green consumption step by

step,” in an article that promoted the use of NGOs in solving China’s environmental

crisis ("Environmental NGOs Encouraging Green Actions ", 2007).

A large number of NGOs have formed around the environment, and in June 2007 the

All-China Environment Federation claimed that there were 2,770 environmental

NGOs (T. Zhang, 2007). Despite the official numbers of NGOs most are

underdeveloped and many more remain unregistered. Given this I will briefly outline

the ways in which the largest and most influential environmental NGOs are promoted

and managed by the government.

The oldest and most influential environmental organization is Friends of Nature

(FoN) which was the first NGO to register with the Ministry of Civil Affairs in 1994.

Global Village Beijing (GVB) is another influential environmental group, and both

are located in Beijing. Both of these groups run education programs, and are active in

Sniffer Packets & Firewalls 78

developing smaller NGOs throughout the country. The leaders of FoN and GVB,

Liang Congjie and Liao Xiaoyi respectively, were both appointed to the Beijing

Organizing Committee for the Games of the XXIX Olympiad (BOCOG).

In 2005 the All China Environment Federation was established and promoted by the

government. At the opening ceremony for the Federation, the Vice Premier,

Zeng Peiyan, said that he “encouraged the federation to further study the major

ecological problems and offer better consultation to government decision-

makers”("New NGO founded to rally all Chinese people against worsening

pollution," 2005). In October 2006 China’s environmental NGOs were called upon

by Zhu Guangyao, the deputy head of the State Environmental Protection Agency, “to

play a bigger role in promoting supervising environment protection” ("Chinese

Environmental NGOs Called on to Play a Bigger Role ", 2006) Zhu (2006) stated that:

Environmental protection has become a major task of China’s modernization. Environmental capacity has become a major consideration in planning development projects. Environmental administration has become a major means to adjust economic structure. Environmental standard has become a major condition for market access. Environmental cost has become a major factor in the price formulation mechanism. The new circumstances have given non-governmental organizations (NGOs) more opportunities to advise the government on environmental affairs, protect the environmental rights and interests of the public, mobilize the public to participate in environmental protection and promote international exchanges and cooperation in this field.

Though there have been incidents when these groups have challenged the

government, the relationship these NGOs share with the CCP is evident and the

promotion of these groups and official sanctioning of their positions is a way of

channelling their influence and limiting or confining their activities. In doing so the

government has by default effectively managed their communication strategies as

well as confining and shaping environmental discourse. In addition to this the

registration process also acts as a filter because it is costly and time consuming,

however to avoid bureaucratic red tape and rigorous selection procedures many NGOs

turn to industrial and commercial administrative bureaus for registration because the

process is easier and quicker (Xin, 2005).

Sniffer Packets & Firewalls 79

Green Riots an Unofficial Discourse

The promotion of NGOs by the government in the media is generally of the good

news story variety. For instance the State Environmental Protection Administration

(SEPA) website mainly covers good news stories relating to China’s environment.

The CCP plans to showcase their ability to clean up the environment as a part of the

2008 Olympics. In July 2007 the SEPA launched a two-month campaign to clean up

the country’s rivers and recovered 725 million yuan (USD$146 million) in fines from

polluting businesses ("China targets 750 firms in war on pollution ", 2007). This lies

in stark contrast to the number of environmental riots and protests that are reported in

the international press. When these stories do appear in the Chinese media they are

often reported very differently.

A number of small-scale rural protests are common and unless they are large they do

not make it into the national or international press. A report in the New York Times in

2005 put the number of protests at 74,000 incidents, up from about 10,000 a decade

earlier (French, 2005). Environment-related riots, protests and disputes in China

increased by 30% in 2006 to more than 50 000 ("Increase in environmental protests

causes instability in China," 2006). As with many stories in the international press

about China they are often initially generated from the Chinese media. Local press

may cover an event and then it gets picked up by the international media, these stories

are then rearticulated and re-circulated for a wider audience. This was also the case

with the Nandan mine disasters in 2001 and the Jiangxi school explosion where the

stories were first released by local press and then picked up by foreign media. The

Western press often cast these stories as a David and Goliath clash, whereas the

Chinese media will often cast rioters having been stirred up by a small group of

troublemakers. An example of this occurred in April 2005 when it was estimated that

thousands18 of residents of Huaxi a town in Dongyang, a city south of Hangzhou,

rioted against police over pollution from chemical plants in a nearby industrial park.

The residents of Huaxi and nearby Huankantao had been complaining about the

pollution and how it affected their health and the productivity of their farms for four

years prior to the riots. The residents made petitions to the SEPA and had sent

delegations to the Zhejiang Provincial Headquarters in Hangzhou and to Beijing prior

18 The reports on the number of rioters vary from 20,000 to 60,000.

Sniffer Packets & Firewalls 80

to the riot (Cody, 2005). The local paper Dongyang Daily blamed local agitators for

the riot (Yardley, 2005). By way of contrast the New York Times cast the protesters

as victims of pollution and official corruption (Yardley, 2005).

The Phoenix Weekly, which is available on the Internet, is a subsidiary of Phoenix TV

in Hong Kong is legally received by ordinary Mainlanders with access to cable or

satellite television, ran extensive coverage of the incident which has since been

translated by Roland Soong of the EastSouthWestNorth Blog. According to the

translation by Soong the Phoenix Weekly noted conflicting stories in the Mainland

media that also conflicted with the stories that their journalists were picking up on the

ground at the riots. Phoenix Weekly ("The Long Story About Huaxi/Huankantou,"

2005)stated:

Although the mainland media were instructed not to report on the matter, the incident was rapidly disseminated in Zhejiang. The people called it a peasant rebellion, the Hong Kong media called it a "large-scale riot" but the local government said that "the removal of illegal structures in Dongyang city was obstructed" because "the desire of the citizens for environmental protection was used by a small minority of individuals with ulterior motives..

Soong also claims that much of the coverage of the incident by foreign journalists

came from Chinese media reports and Internet sources. This is due to the fact that

journalists would not have been able to gain access to the area; in fact one foreign

corespondent was briefly detained. Access to Dongyang was blocked and check

points were set up at all of the major entrances to the town, making it even more

difficult to report on the riots. This tactic was also used in the Jiangxi school

explosion. The residents of Huaxi responded in the same way that the parents did at

Jinagxi, they turned to the Internet as a means of revealing the story to a wider

audience. According to Roland Soong news of the event “was rapidly transmitted

from the local chat rooms, but the local government immediately blocked the chat

rooms and other channels. The local media were also ordered not to report on this

case. Yet, foreign media and Hong Kong newspapers were able to report on this

incident through the chat room information sources” ("The Long Story About

Huaxi/Huankantou," 2005). The riots began on the night of the 10th of April and were

discussed in Internet forums up until the 13th of April when this source of information

Sniffer Packets & Firewalls 81

and discussion was shut down and posts deleted19. Despite this, Western news reports

claimed victory for the people of Huaxi/Huankantou as six of the thirteen factories

were ordered to shutdown following the protests and nine residents were arrested

(Cody, 2005; Ramirez, 2006).

In October 2005, six members of Green Watch were arrested by the Public Security

Bureau in Hangzhou. Green Watch is an environmental group that formed after

members monitored the riots in Huaxi. According to Human Rights in China one of

the members of “Green Watch Lai Jinbiao, was placed under criminal detention from

April 12 until May 11 on the charge of ‘illegally providing intelligence overseas’”

("Environmental Activists Detained in Hangzhou ", 2005). It can be confidently

hypothisiesd that Lai was talking to foreign journalists who had converged on the area

to cover the story due to China’s hardline practices.

In 2007 I searched the Internet again for information on the riots and what had

happened in the town of Huaxi and I did not find much information. What remains on

the Internet that is accessible outside of China are stories of the riots in 2005.

Searches on official websites such as the China Daily, Xinhua, and the Peoples Daily

are good news stories about the prosperity of the town and how it is one of the

wealthiest in China.

In terms of the management of time as official discourse or history, the CCP deletes

and blocks stories from the Internet that do not concur with their own view of the

event. This is a theme that has runs throughout many of the case studies in this thesis,

in that an event occurs, and traditional informational flows are circumvented and new

flows are created through the Internet. Information of these events is managed

according to CCP needs, so stories are either eliminated or rewritten and absorbed and

used in the CCP’s efforts at image building. Events that are seen as a challenge to the

authority of the CCP are contained and are systematically removed from Chinese

cyberspace, as in the Jiangxi school explosion and the Huaxi/Huankantao riots. At

other times stories have been absorbed by the CCP and used to push a line that the

19 Roland Soong translated a number of posts from Chinese Internet forum comments (via Boxun). He cites this as an “example of citizen reporters taking over when the mainstream media are missing in action” ("Citizen Reporters On The Huankantou/Huaxi Incident," 2005). See Appendix VI.

Sniffer Packets & Firewalls 82

party wants. This technique was employed in the Black Kiln case in Chapter seven.

The result is that China has, to some extent, built a separate Internet. It is separate in

what it carries as history or as journalistic accounts of an event with material that is

different in focus and content from the broader World Wide Web. An example of this

blatant absence of history is that accounts of 1989 Tiananmen Square incident that are

absent from the Chinese Internet.

The CCP has responded quickly to the changes in informational flows as a

consequence of the Internet. This adaptation to a changing environment is consistent

with Diebert’s extension of the ideas of Innis in Diebert’s use of Darwin’s theories of

evolution applied to changes in communications technology and his application of

medium theory. Diebert (1997, p. 30) argues that “a change in the mode of

communication (environment) will ‘favour’ certain social forces and ideas (species)

by means of functional bias towards some and not others, just as natural environment

determines which species prosper by selecting for certain physical characteristics”. By

social forces Diebert (1997, p. 32) means “actual social groups, actors, and various

forms of social organisation or normative or goal driven social behaviour”. My aim

here is to extend this and to argue that survival of a species in an evolutionary sense is

about the adaptation of a species to a changing environment. Just as some species are

able to adapt and change, some social groups are able to adapt and change. It is not so

much the environment that chooses which species or ideas survive and flourish, but

rather the way in which a species or a group, in the case of communications

environments, adapt to those changes. In the case of China as elsewhere the

government has adapted to the changing communications environment. The CCP has

been actively involved in shaping that environment through the strategies that they

employ to manage the Internet, which includes the management of code as a means of

censorship, the legal framework and the development of content. In the end the

Internet is a tool that both facilitates change and can be shaped and modified by those

who use it. It is because of this that it is more important to look at what people do

with the technology rather than the technology itself.

The management of the Huaxi/Huankantao riots also highlights the negotiation of

centre/margin relationships between Beijing at the centre and officials in Zhejiang

province at the margins, as well as centre margin relationships in Zheijiang between

Sniffer Packets & Firewalls 83

Hangzhou, the provincial capital, and the Dongyang officials at the margins.

Goodman and Segal argue that this negotiation of regionalism is a consequence of the

Open Door policy. Goodman (1994, p. 13) argues that “the centre lays down the

broad outline of a policy, with the provinces adopting specific local measures for

implementation.” What the Internet did in the case of the Huaxi/Huankantao riots was

to provide a window for the central government to more closely observe what is going

on at the margins, thus reinforcing the authority of the centre. Traditional modes of

communication allowed provincial officials to cover up or paint a picture of what

Beijing ‘at the centre’ wanted. For example, the famine that was a consequence of the

Great Leap Forward in the 1950’s is largely seen as a result of poor central planning

and the policies of the campaign. Food shortages were exacerbated by the boastful

claims about grain output that was exaggerated at every level of government to paint a

picture of success for the central government20 . This has also contributed to the

perception that official figures in China are notoriously unreliable.

As previously mentioned the environment has been identified by the government as

one of the most serious issues facing the stability of the country. In response to this

impending crisis there have been experiments with new forms of public participation

so as to avoid riots like that in Huaxi/ Huankantao. The Xiamen PX (paraxylene)

plant in Fujian is a good example of this, and is being hailed as a win for people

power in the PRC21. In 2007 construction began on the plant, and by May residents of

the area were complaining that it was already giving off an industrial odour. A mass

protest was organised via SMS (Short Message Service) text messages via mobile

phones (see figure 3). News of the event spread across the Internet via social websites

such as Twitter, Flickr space, and it also emerged as an issue on blogs and other

forums. Zoula, also known as the first citizen reporter, descended on Xiamen to cover

the story on his blog and website22. As is often the case, as the story grew the local

press stopped covering the story, however coverage of the story was allowed to

continue nationally. A columnist for the Southern Weekend, Lian Yue, wrote at length

20

For more detail on the causes of the famine see Wei Li, and Dennis Yang Tao (Wei Li & Tao, 2005).

21 For more background on the development see Roland Soong’s Blog EastSouthWestNorth http://www.zonaeuropa.com/20070601_1.htm22 Zoula’s Blog is covered in Chapter 8.

Sniffer Packets & Firewalls 84

about the issue on his blog. He also suggested that Xiamen residents start websites

("SMS Texts Energize a Chinese Protest ", 2007).

Figure 3: The following translation comes from the China.org website run by the State

Council. “The Taiwan-funded Xianglu Group has begun building a PX plant. It’s like

an atomic bomb in Xiamen.

("SMS Texts Energize a Chinese Protest ", 2007)

Many people will suffer leukaemia and more babies will be born with congenital defects." A paraxylene project should be at least 100 kilometres from a major urban settlement, but we are only 16 km from the project. For the sake of our future generations, please forward the message to all your friends” ("People vs. chemical plant ", 2008). The end of the message calls for people to protest on the streets on the 1st of June.

An estimated 8,000 to 10,000 people took to the streets on the 1st of June to protest

against the plant. The Xiamen press followed the familiar pattern of blaming an

individual or a small group of agitators for the unrest. In an editorial published in the

Xiamen Daily it stated “that both the government and concerned citizens had

Xiamen’s best interest at heart, but that one individual, the SMS writer named

XiamenWave22, was “misleading the public and provoking hostility between the

government and the masses”("SMS Texts Energize a Chinese Protest ", 2007).

In an unusual twist the project was stalled by the government, on June 7, a week after

the street marches, when the government put a hold on the project pending an

environmental assessment and public consultation. This is unprecedented and

represents a form of experimentation with public participation. On December 27 there

was an announcement that the project would be moved and that the provincial

government would compensate the plant’s owners.

Sniffer Packets & Firewalls 85

The new forms of experimentation with public participation follow from the 17th

Party Congress where Hu Jintao called for the expansion of socialist democracy. Hu

(2007b, n.p.) argued China needed to:

Expand socialist democracy and better safeguard the people’s rights and interests as well as social equity and justice. Citizens’ participation in political affairs will expand in an orderly way. The rule of law will be carried out more thoroughly as a fundamental principle, public awareness of law will be further enhanced, and fresh progress will be made in government administration based on the rule of law. Primary-level democracy will be improved. The government will markedly enhance its capability of providing basic public services

The way in which the protests over the Xiamen PX plant were played out in the media

is a visualisation of public opinion, and of how centre/margin relationships are

negotiated on the Internet. These groups do not necessarily speak to one another

directly; they do this via the media. In this instance the CCP allowed the expression of

public opinion to drive the outcome of the project. If they wanted the plant to go

ahead and silence the protesters they would have done, just like they did in Huaxi. If

the authorities want to close down Chatrooms and BBS they can, if they want to wipe

blogs and stop people posting they can. They can do this because technologically this

can and is being done. If the CCP choose to do this it is probably because they are

showing an emerging understanding that ‘spin’ type management usually has more

positive and fewer negative consequences.

HIV/AIDSThe unreliability of official figures in China on the number of HIV/AIDS sufferers

makes it difficult to get an accurate picture of the extent of the problem. The first

case was reported in 1985 and the disease has spread rapidly since that time. In 2005 a

joint study by the Ministry of Health, the World Health Organization and United

Nations AIDS (UNAIDS) put the number of people living with the virus at 650,000,

75,000 of whom had developed full blown AIDS (Z. Wang, 2007). In 2006 the

number of cases was reported the number of infections as 183,733 and it was said this

was up 30% on the previous year. In another report in 2007 the number of people

infected with the virus was put at 214,300 with 56,758 having full blown AIDS (H.

Wang, 2007). “An official report released just prior to World AIDS Day on December

Sniffer Packets & Firewalls 86

1 2007 said that “China officially reported 223,501 HIV contracted cases, including

62,838 AIDS patients, by October 2007 while about 700,000 people are estimated to

be living with HIV/AIDS” ("Premier Wen revisits AIDS-suffering villages ", 2007).

In the news reports that I researched for this chapter there also seemed to be a time lag

in the way in which figures were reported. For instance, several of the official CCP

news stories from 2007 used figures from 2005. Despite the inaccuracies in the

figures the CCP has encouraged the development of NGOs to address the epidemic23.

The rhetoric from the CCP on the fight against HIV/AIDS is as contradictory as the

management of the environment and the Internet. On the one hand there is the

promotion of the development of NGOs to assist the government in tackling the

epidemic and at the same time the government has attempted to silence other groups.

The aim is to manage debate within the confines of an official version of the outbreak

of HIV/AIDS and its management. The official version is acknowledgement of the

problem to some degree, and through the use of the media is trying to convey that it is

being addressed and well managed by the government. In part the management of the

official version of the epidemic is via the management of NGOs, in much the same as

it is done with environmental groups. That is, NGOs are bounded by regulation and

the need for government support in order to exist and this in turn affects the way in

which NGOs operate.

As in the case of environmental NGOs there are hundreds of groups and very few of

them are recognized by the government; consequently few are funded by the

government. For example in 2007 the Central Government announced an alliance of

HIV/AIDS NGOs to assist in the fight against the disease. The NGOs, the Chinese

Association of Sexually Transmitted Diseases and AIDS Prevention and Control, will

oversee the alliance as well as integrate and coordinate the participation of Chinese

and international NGOs ("NGO Alliance to Step Up Fight Against HIV/AIDS ",

2007). This is similar to the integration of Environmental groups, and centralizes the

management of NGOs.

23 Avert.org provides good background on the different phases of the epidemic from the first case to current policies.

Sniffer Packets & Firewalls 87

In the run up to world AIDS day in 2007 there was the launch of a new campaign to

combat the spread of the virus and to curb the prejudice aimed at those who suffer

with the disease. The campaign included a series of television commercials featuring

Jackie Chan. The Premier, Wen Jiabao and Hu Jintao both made public appearances

to promote AIDS awareness and this is consistent with western PR practices ie, the

photo opportunity. Premier Wen has been making the photo opportunity pilgrimage to

Henan province since 2003. During these visits the Premier visits orphanages and

reiterates the central government’s position and policy which is the provision of free

medicine and doctor’s consultations to people infected with the virus, and free

education for children orphaned by AIDS. Hu Jintao also visited communities and

doctors in northern Beijing as part of World AIDS Day. Both Hu and Wen were using

these visits to promote awareness about the virus and to address the prejudice against

those with the virus ("Premier Wen revisits AIDS-suffering villages ", 2007). These

visits are tightly controlled by both central and provincial authorities who hold their

own ‘shows’: one for the world, one for the central government and one for the

people.

As is often the case there is a gap between central policy and regional

implementation. According to the Washington Post provincial hospitals fail to run the

correct tests to reveal the virus or they purposely misdiagnose the virus in order to

cover up the extent of the problem, and this has been exacerbated by corruption (Fan,

2007). Regional differences are also reflected in the different modes of transmission

of the virus. This is due in part to regional economic conditions and issues that have

arisen out of the open market economy. For instance, in central China the main mode

of infection has been through the collection and transfusion of blood products. In

coastal cities it has been through prostitution, and in western China it is through

prostitution and intravenous drug use (Ma, 2005, p. 133). Nationally, though, in 2005

unsafe sex was cited as the main mode of transmission ("Report: unsafe sex major

cause of HIV infection," 2007). The number of reported cases vary in from region to

region and this is reflected in the diverse attitudes to the management and prevention

of the disease in different provinces (Bezlova, 2005).

One of the most tragic cases of mismanagement and corruption involved the

medically acquired infection of thousands of rural peasants in Henan. In the 1990’s

Sniffer Packets & Firewalls 88

officials in Henan, one of the poorest provinces encouraged peasants to supplement

their income through the sale of their blood. At the time there was no screening for

disease and blood was often collected in unhygienic conditions which led to the rapid

spread of the virus. In some cases this was exacerbated by attempts to prevent

anaemia through the practice of injecting regular donors with unscreened red cells

extracted from the valuable plasma ("China: House Arrests Stifle HIV/AIDS

Petitions," 2006). In 2001 the scandal broke nationally and the central government

responded by ordering the collection clinics to be phased out and the screening and

regulation of blood products be tightened. However, the practice continued and there

are still occasional reports about illegal blood clinics. In June 2007 a new campaign

was launched in central China to crackdown on the practice ("New Campaign to Curb

Illegal Blood Collection," 2007).

It is not clear how many people were infected as a result of this practice, however

official figures put the number at 35,232 reported HIV carriers, including 21,828 with

AIDS at the end of 2006 ("China: House Arrests Stifle HIV/AIDS Petitions," 2006;

Illegal Blood Trade Main Cause of AIDS in Henan," 2007). The effect has been

devastating and in some instances has wiped out entire villages and left thousands of

children orphaned and abandoned by their extended families and the broader

community ("China: House Arrests Stifle HIV/AIDS Petitions," 2006). The situation

in Henan is comparable to the hardest hit communities in Africa and it is the worst

affected area in Asia (Beyrer & Csete 2003).

The mismanagement and corruption of blood collection practices is not confined to

Henan and the pattern of neglect of AIDS victims and the denial of the problem is

reflected in other parts of the country. The epidemic is not seen as a national tragedy

but an economic problem and a major source of embarrassment for the government.

Both cases highlight the negotiation of spatial relationships between Beijing at the

centre and provincial governments at the margins. Chris Beyrer and Joanne Csete

(2003) argue that “China’s stalled responses to the outbreak, and its treatment of those

few courageous citizens who have exposed it, reflect the state of civil society, rule of

law, rights of citizens, and emerging center-periphery dynamics of the new China.”

Government officials in Henan were actively involved in trying to cover up the

tragedy, and this is a feature of many of the case studies of this thesis including the

Sniffer Packets & Firewalls 89

Jiangxi school explosion, the mine disasters, and the SARS outbreak. There were also

reports that courts in Henan had refused to hear compensation cases of those infected.

Human Rights Watch said that the “Health Minister Gao Qiang was quoted in the

international press as saying that the courts should admit those cases and make fair

judgments”("China: House Arrests Stifle HIV/AIDS Petitions," 2006). In another

incident in 2006 the New York based Human Rights Watch claimed that numerous

sufferers of HIV/AIDS in Henan were placed under house arrest to stop them from

petitioning the National People’s Congress to prevent them from seeking redress from

the government after being infected by tainted blood products. Corruption also

became a feature of centre/margin relationships when local officials were arrested and

others sacked for the theft of aid from the central government and private donors in

2006.

The Henan provincial government have also gone to great lengths to contain the

activities of high profile activists. Dr Gao, an internationally acclaimed

gynaecologist, first brought the scandal of Henan to light after her lengthy

investigation into the number of people presenting to her with the symptoms of the

virus. Dr Gao used her own funds to treat people with the virus and has often been

threatened and harassed for her work with victims of the virus. Her attempts to

uncover the extent of the crisis were thwarted by local officials who told her to stop

what she was doing. Furthermore she was prevented from visiting villages. The

campaign against her was stepped up when her children lost their jobs. When Dr Gao

tried to take her findings to Beijing she was detained by authorities in Henan. Dr Gao

was awarded Model Citizen by the Ministry of Education in Beijing in 1999 and was

prevented from being able to pick up the award by Henan authorities. In August 2002

she was interviewed by China Newsweekly about her work, which was reprinted in

other publications. Following the publication of the interview, Henan Provincial

officials ordered her not to talk with journalists ever again (Gao, 2001, My "AIDS

Prevention Journey). Her story and her findings were eventually taken up by the

international media when a Beijing based journalist for the New York Times covered

her story and that of the victims of Henan (Beyrer & Csete 2003).

Dr Gao was awarded the Jonathan Mann Award for Health and Human Rights from

the Global Health Council in 2001, and the Ramon Magsaysay Award for Public

Sniffer Packets & Firewalls 90

Service in 2003, but was denied the right to travel to receive her awards. China

Central Television designated her one of the “Ten People Who Touched China in

2003”. There has been outcry from the international community over Dr Gao’s

treatment and she was given permission to travel to the United States of America to

receive an honor bestowed upon her by the Vital Voices Global Partnership, a

nonprofit organization in 2007. Initially she was denied permission to travel but this

was later revoked. As Beyrer and Csete point out, it appears that under international

pressure Beijing ordered the Henan government to “ease its threats and harassment.

When asked why the Chinese communist government did not want her to travel to the

United States to receive awards, she answered, “They’re afraid that I will expose the

fact that (illegal) blood selling is the main reason for the AIDS epidemic in China” (C.

Sun & Tian, 2007).

In a situation that seems to have changed track Peter Piot, Director of UNAIDS,

visited China in July 2007 to meet with Dr Gao in Henan and visit families affected

by the virus. Dr Gao was also visited by Henan officials as part of a photo story for

local papers during Chinese New Year celebrations, even though she was under house

arrest and was being prevented from travelling overseas (Yardley, 2007). Dr Gao and

her story have been absorbed into the central government’s version of the AIDS

epidemic, and their attempts to use her for their own propaganda confirm this. In July

2007 the government admitted that illegal and unhygienic blood collection practices

in Henan are the main cause of HIV/AIDS in the province. However, they still cite

other reasons such as unprotected sex with foreigners and prostitution in other

provinces ("Illegal Blood Trade Main Cause of AIDS in Henan," 2007).

There are definite tensions being played out here between Beijing at the centre and

Henan at the margins, but the extent to which Beijing is in control or has a clear line

on Dr Gao is unclear. Despite the apparent back down, Dr Gao is still effectively

under house arrest but has been allowed to maintain a blog that was still accessible as

of November 2007. The blog could easily be shut down if Beijing wanted it that way,

all of which suggests that there seems to be a lack of consensus about how to deal

with Gao and what she represents. Dr Gao’s treatment by Henan officials also

confirms this.

Sniffer Packets & Firewalls 91

Other prominent HIV/AIDS activists such as Hu Jia, Zeng Jinyan and Wan Yanhai

have been treated in a similar way. Wan, the founder of the grass roots organisation

AiZhi (ai爱 as in love, and Zhi 知 as in knowledge), was arrested in August 2002 for

posting “illegally acquired interior classified documents of relevant state departments

to overseas individuals, media sources” on a website ("Anti-AIDS Leader Freed,"

2002). Wan was released after confessing his crimes and after intense international

pressure (Beyrer & Csete 2003; Ma, 2005). In an interview following his release Wan

said that “AIDS became an ideological weapon to attack Western culture. The media

didn’t talk much about AIDS in the 1980s—at least not AIDS in China. There was no

limit to talking about AIDS internationally, but the media kept silent on AIDS

domestically” (Rosenberg, 2006, n.p.) .

In one of China’s most famous cases Zeng Jinyan and her husband Hu Jia

environmental and AIDS activists, were detained by Chinese authorities in Beijing

and spent 214 days under house arrest between August 2006 and March 2007 without

any legal proceedings. Hu had been posting information on his website and blog about

dissident and peasant protests. Zeng told their story in a blog that detailed their

surveillance by secret police and her husband’s disappearance. Naturally her blog was

blocked but she continued to blog via email to a blog site outside of China. This

occurred despite her Internet connection being regularly cut (Bristow, 2007). The

couple won the Sarkhavrov Prize, a human rights workers award from the European

Parliament in September 2007. In the same year Time also named Zeng one of the

world’s 100 most influential people. The couple have also turned their detention and

surveillance into a documentary called Prisoners of Freedom City, and when they

attempted to leave China in May 2007 to show the film overseas they were detained

and placed under house arrest once again. The documentary is available on Youtube

outside of China.

On December 27, 2007 Hu Jia was arrested and Zeng and their two month old baby

were placed under house arrest. The only visitors she is allowed are their parents.

Hu’s lawyers have been prevented from seeing him because his case is said to involve

‘state secrets’. Threats have also been made to take the baby away in between feeds,

and friends and supporters of the couple have been prevented from delivering baby

Sniffer Packets & Firewalls 92

formula to Zeng; some friends have been taken in for questioning according to Radio

Free Asia (Mudie & Chen, 2008). Bloggers have come out in support of Hu and

Zeng and there is an online petition calling for his immediate release. It is quite

feasible that Hu and references to him can be cleaned from the Internet using

technological means. In the Western media Hu’s arrest was tied to a pre-Olympics

crackdown on dissident activities. Radio Free Asia also reported that Dr Gao’s family

has been threatened and harassed; email has been blocked and her phone has been

tapped (Mudie & Chen, 2008).

All three cases and the way they played out in the international media and the Internet

are also a visualisation of the negotiation of centre/margin relationships between

Beijing and the international community. These cases also highlight the tensions in

those relationships and the contradictory nature of the way in which the Internet and

its impact on the management of information can be viewed. A case can be made for

either an emerging democracy or for further authoritarian oppression, as is evident in

the reporting of these incidents. The gaps and the contradictions that are evident in

some of the case studies also allude to differences in the party at different levels.

Conclusion

NGOs represent an official voice as they have been sanctioned by the CCP, they are

regulated and registered. Then there is the unofficial, this includes individuals who

post videos of China’s pollution on YouTube for the world to see and riots that are

reported in the international press. The rioters and the YouTube posters are often there

in response to an event or a crisis as was evident in the mine disasters, the SARS

outbreak, the Jiangxi school explosion, and the Brick Kiln incident. They become

events in a broader sense when they hit the Internet and then become staged events

when the government begins to mount their response. Even a riot, though

spontaneous, is a constructed event, albeit a chaotic one. A riot is still a form of

protest. In addition, the way that local officials handle these things has come under

increasing scrutiny from the central government in Beijing and the Huaxi/Huankantao

riots bear this out. The management and harassment of HIV/AIDS activists has been

played out on the international stage through the Internet to some extent, because to

some degree international relations are played out in the media through press

statements, interviews and events. In the end though what all of these case studies

Sniffer Packets & Firewalls 93

reveal is that in order to understand the effect of the medium you must look at the

context in which people are using it and how authorities manage that use. The ways in

which authorities manage information flows needs further contextualization in

relation to the issues that a country faces such as environmental degradation, and the

AIDS epidemic, and the image China wishes to present to the world at the Olympics

in 2008. In addition, the increasing pressure from the international community over

issues such as Beijing’s involvement in Dafur and the handling of the situation in

Tibet is also having an impact on the way in which information is managed in China.

Sniffer Packets & Firewalls 94

C h a p t e r 6

Hacking: Circumnavigating the Great Firewall Hacking is circumnavigating the great firewall or any firewall for that matter. It is a

direct challenge to any information management strategies that the CCP use to contain

the consequences of the development of the Internet. The most spectacular hack

attacks were carried out by Falun Gong in 2002 when sect members hacked into

satellite and cable networks to broadcast messages in support of the sect. There have

also been claims of officially sanctioned hack attacks against the sect’s websites in the

USA, Canada, the United Kingdom and Australia24. In 2001 there was a spate of tit

for tat attacks between the USA and China following the spy plane incident. This

chapter will focus on the kinds of hack attacks that have been reported in both the

Western and Chinese press and the strategies employed by the PRC to deal with

hacking.

Reports on hacking fall into two kinds of stories, those that suggest the hacking has

been officially sanctioned or hacking that is unofficial. There were suggestions during

the hack attacks associated with the spy plane incident that they were officially

sanctioned. The hack attacks carried out by Falun Gong were beyond the control of

the government and therefore unofficial. The strategies employed by the CCP to

manage the flow of information in regards to hacking are regulation, surveillance

using the code that is used to build the Internet, the promotion of self surveillance,

and content development. In order to do examine those strategies I will look at some

of the hack attacks on China, and some that were generated within the PRC and how

they have been reported by both the western and Chinese media. More specifically

this chapter will focus on how the relationship between nationalism and hacking and

how this is played out in news stories. Hacking in this context represents another

forum in which centre/margin relationships between the PRC and other countries and

are visualised through media reports of these incidents. This is because hacking

constitutes a virtual form of interaction between the CCP as the central authority of

the PRC and other groups such as democracy dissidents and nations. This chapter also

24 For more details see Michael Chase & James Mulvenon’s (2002) book You’ve Got Dissent! Chinese Dissidents Use of the Internet and Beijing’s Counter-Strategies

Sniffer Packets & Firewalls 95

looks at the way that time as an official dialogue is managed in response to hacking.

In addition to this I will look at democracy dissidents outside of China and their use of

hacking.

Hacking usually refers to someone who tries to disrupt or gain unauthorised access to

a computer system. Patrice Riemens (2002, n.p.) says that:

Hackers, also often, but inexactly referred to as "computer pirates" or other derogatory term, constitute without doubt the first social movement that was intrinsic to the electronic technology that spawned our networked society. Hackers, both through their savyness and their actions, have hit the imagination and have been in the news right from the onset of the "information age," being either hyped up as bearers of an independent and autonomous technological mastery, or demonized as potential "cyber-terrorists" in the process. More recently they have been hailed in certain "alternative" intellectual and cultural circles as a countervailing power of sorts against the increasingly oppressive onslaught of both monopolistic ICT corporations and regulation-obsessed governments and their experts. Transformed into role-models as effective resistance fighters against "the system," their garb has been assumed with various degrees of (de)merit by a plethora of cultural and political activists associated, closely or loosely, with the "counter-globalization movement.

Though this definition is aimed at western notions of hacking and hacking culture it is

still useful as a starting point to discuss the kinds of activities that characterize the

incidents that are covered in this chapter. This kind of definition is also significant

because it encompasses one of the themes of this thesis, which is the mythology of the

democratising prospects of the Internet. What the above definition fails to take into

account more generally though is the kinds of official and officially sanctioned

hacking and crime based hacking the goes on internationally.

Regardless of the intention of a hacker, whether they are hacking for political reasons

or ‘criminal’ reasons, many of the methods remain the same. These activities include

the use of junk email to flood and disrupt websites, the writing of viruses to disrupt a

network, or the changing of content on a website. So, it is within this context that it

becomes important to look at who is hacking for whom, in much the same way that

Lessig (2006, p. 6) argues we must look at who the code writers are and who they

work for. Before looking at that aspect in more detail, I will first outline the legal

Sniffer Packets & Firewalls 96

framework that is used to manage hacking as one of the strategies for managing the

Internet.

Legal FrameworkThe first laws that were directly aimed at the prevention of hacking were endorsed at

the 19th session of the Ninth National People’s Congress (NPC) Standing Committee

in December 2000. The resolution made it illegal for the following activities ("First

Net Security Law Endorsed ", 2000):

-- To enter networks concerned with national security;

-- To create and spread computer viruses and to interrupt computer networks or communication services;

-- To spread rumours and slanders or publicize harmful information on Internet;

-- To steal or disclose state secrets, intelligence or military secrets through Internet;

-- To stir up ethnic hatred and discrimination, and sabotage national unity through Internet;

-- Using Internet to organize a cult organization and keep in tough with members of the cult organization, undermining the enforcement of state laws and regulations;

-- Using Internet to sell fake and substandard products or advertise goods and services in a deceitful way;

-- Using Internet to damage other people’s business reputation and commodity reputation;

-- Using Internet to infringe upon other people’s intellectual property;

-- Using Internet to fabricate false information affecting securities and futures trading or disturbing financial order;

-- To set up pornographic websites or web pages, provide access to pornographic websites, or spread pornographic books, movies, video products and photos on Internet;

Sniffer Packets & Firewalls 97

-- To defame other people on Internet;

-- To illegally intercept, alter or delete other people’s e-mail or other data, infringing upon citizens’ freedom and confidentiality of communications; and

-- Using Internet to commit theft, fraud and atrocities

The regulations were updated in 2006 when the Ministry of Public Security (MPS)

though these were aimed at preventing the spread of computer viruses, junk emails or

spam and pornography. In justification a report on the China Internet Information

Centre website Wu Heping, a spokesman with the MPS, said that “more than 80

percent of the domestic computers were once infected by viruses annually in recent

years and the daily junk mails flowing to domestic users exceeds 60 million, making

China a giant country of sending and receiving junk mails” ("New Regulations to

Ensure Internet Safety ", 2005).

In 2001 there were calls to strengthen network security through the development of

Internet technology within China. Bai Yi, director of China National Laboratory of

Computer Network and Information Security, said on June 5 in 2001 “that China

should develop its own information industry on the one hand and stipulate strict

regulations on management and prevention on the other in order to strengthen the

management of information security”("Dual Tactics Adopted to Ensure Information

Security in China," 2001). Bai Yi also said that “China should develop its own

information industry to gradually take the place of imported products with homemade

ones, such as the operating system, router and chip [sic]” ("Dual Tactics Adopted to

Ensure Information Security in China," 2001). At the time these kinds of statements

also had a lot to do with concerns about back door programs placed inside foreign

software for the purposes of spying on China. In February 2000 the government

banned the importation of foreign encryption software, though by March they had

backed down from this position ("Government to Ban Trade in Foreign Encryption

Software ", 2000; Olesen, 2000).

Military & Cyber warfareThe management of information flows and the protection of networks were built into

the Internet from its inception. Protecting information and networks from external

Sniffer Packets & Firewalls 98

threats and attacks is a part of national security and this is a consideration for all

nations connected to the Internet. There were reports in the Jiefangjun Bao (PLA

Daily) that the army was preparing for cyber warfare as early as 1999, and that there

was to be a new branch or ‘network army’("China's PLA Prepares For Network

Warfare ", 1999). The paper said that “the invasion of the "network space" will be

considered a violation of national sovereignty, and the gravity of the crime will not be

treated any less than a territorial violation by land, sea and sky…. Network

sovereignty has the same economic, political and military significance as territorial

land, sea and sky sovereignty” ("China's PLA Prepares For Network Warfare ",

1999).

Network protection is still an important feature of the PRC’s overall military strategy.

In November 2006 Liberation Army Daily commentator argued that: (Office of the

Secretary of Defense, 2007):

[The] mechanism to get the upper hand of the enemy in a war under conditions of informatization finds prominent expression in whether or not we are capable of using various means to obtain information and of ensuring the effective circulation of information; whether or not we are capable of making full use of the permeability, sharable property, and connection of information to realize the organic merging of materials, energy, and information to form a combined fighting strength; [and,] whether or not we are capable of applying effective means to weaken the enemy side’s information superiority and lower the operational efficiency of enemy information equipment.

The 2002 Chinese White Paper on Defence recognises the importance of information

warfare and the significance of electronic networks in the management of information

in military situations. The paper outlines China’s strategy in relation to Network

based warfare and says that “rapid and drastic changes are taking place in the military

field around the world, and a new serious disequilibrium has occurred in the balance

of military power. The extensive applications in the military field of new and high

technologies led by IT have stretched the battlefield into multidimensional space

which includes the land, sea, air, outer space and electron” (PLA, 2002). By electron

it is assumed to mean the information sphere. Finally, the White Paper acknowledged

that the PLA was studying and had done training that investigated models of

integrated network electronic warfare (INEW) (Thomas, 2005). The USA also has

cyber warfare plans including a unit of hackers (Lasker, 2004).

Sniffer Packets & Firewalls 99

China is often identified as the origin of hack attacks on Western computer systems

and as such the United States Government takes seriously the potential threat China

may pose to American network security. Toshi Yoshihara, from the Institute for

Strategic Studies, writes that “it is therefore conceivable that information warfare

(IW) could provide China with the capacity to hinder American military operations in

the Asia-Pacific, a region of central importance to U.S. national security interests.

Hence, the direction of China’s IW strategy has direct policy relevance to the United

States” (Yoshihara, 2001). In 2000, the Department of Defence warned that, “China

has the capability to penetrate poorly protected U.S. computer systems and potentially

could use CNA [computer network attacks] to attack specific U.S. civilian and

military infrastructures” (Farrell, 2002).

According to the annual report to United States Congress on Military Power of the

People’s Republic of China 2007 the PLA is investing in electronic counter measures.

The report says that (Office of the Secretary of Defense, 2007):

China’s computer network operations (CNO) concepts include computer network attack, computer network defence, and computer network exploitation. The PLA sees CNO as critical to achieving electromagnetic dominance” early in a conflict. Although there is no evidence of a formal Chinese CNO doctrine, PLA theorists have coined the term “Integrated Network Electronic Warfare” to prescribe the use of electronic warfare, CNO, and kinetic strikes to disrupt battlefield network information systems. The PLA has established information warfare units to develop viruses to attack enemy computer systems and networks, and tactics and measures to protect friendly computer systems and networks. In 2005, the PLA began to incorporate offensive CNO into its exercises, primarily in first strikes against enemy networks.

There have been a number of media stories about hack attacks on Western military

networks and government websites. The most widely reported were the attacks

following the bombing of the Chinese embassy in Belgrade in 1999 and again in 2001

following the spy plane incident. In the case of the spy plane incident there was the

suggestion that the attacks were officially sanctioned by the Chinese government, in

particular the attacks carried out by the Red Honker Union. It is plausible that the

Sniffer Packets & Firewalls 100

group did have official sanctioning as they had a website in China and were never

arrested for their activities. In addition, the State Council sponsored website of the

China Internet Information Centre25 reported the break up of the Red Honkers in

2005, and dubbed them the ‘guardians’ of Chinese cyberspace. .According to the

report “membership of the group was once as high as 80,000 and it organized many

website attacks on overseas government sites as well as those of schools and private

companies, and engaged in virtual skirmishes with groups of foreign hackers”

("Largest Hacker Group in China Dissolves," 2005). The re-grouping of Red Honkers

later that year was reported on by the Peoples Daily who said that “the task of the

alliance was to prevent hacking attacks from foreign countries” ("China's anti-hacking

alliance regrouped," 2005). The appearance of the story on a website with such a

strong connection to the State Council, headed by the Premier Wen Jiabao, and the

People’s Daily means that the Red Honkers are sanctioned by the CCP at the highest

levels.

In 2007 there were a number of reports in the Western media alleging hack attacks

that originated in the PRC. An official with the Naval Network Warfare Command in

the USA suggested that the majority of hack attacks on Department of Defence

websites and networks came from China, and that the frequency and intensity of

attacks “has reached the level of a campaign-style, force-on-force engagement”(Rogin,

2007). As is often the case it was also suggested that there was a high probability that

the attacks were officially backed by the government, based on the number of attacks

and the allegation that the attacks were very deliberate.

In August 2007 accusations were made against the Chinese government’s

involvement in a number of hack attacks on Germany, Australia, New Zealand,

France, the USA and the United Kingdom. The story first broke when the German

Chancellor Angela Merkel visited Beijing. Her trip was shadowed by allegations from

25 China Internet Information Centre’s runs an authorised government website, www.china.org.cn which is published under the auspices of the State Council Information Office and the China International Publishing Group in Beijing. The State Council Information Office is run by the State Council, the highest administrative authority in the PRC.

Sniffer Packets & Firewalls 101

Spiegel that the Chinese government had hacked into “a large number of computers in

the German chancellery as well as the foreign, economy and research ministries had

been infected with Chinese spy software” ("Merkel's China Visit Marred by Hacking

Allegations," 2007). Trojan Horses26 were used to infect the computers and the

attacks were launched from the north western province of Lanzhou and in the South in

Guangdong province ("Merkel's China Visit Marred by Hacking Allegations," 2007).

According to Spiegel “German officials believe the hackers were being directed by

the People’s Liberation Army and that the programs were redirected via computers in

South Korea to disguise their origin” ("Merkel's China Visit Marred by Hacking

Allegations," 2007).Premier Wenjiabao denied the claims and said that “the Chinese

government attaches great importance to the hacker attack on the German government

networks. China would take ‘determined’ and ‘forceful’ measures to combat hacker

activities” ("Premier Wen tells Merkel China opposes hackers," 2007).

In early September 2007 the British newspaper the Financial Times alleged that The

Pentagon had been hacked by China’s military and that 15,000 computers had to be

checked and cleaned. According to the London based publication Computing, a

former Pentagon official was quoted as saying that “the PLA has demonstrated the

ability to conduct attacks that disable our system ... and the ability in a conflict

situation to re-enter and disrupt on a very large scale” (Thomson, 2007). According to

the Financial Times, “Senior US official said the Pentagon had pinpointed the exact

origins of the attack. Another person familiar with the event said there was a "very

high level of confidence . . . trending towards total certainty" that the PLA was

responsible” (Sevastopuloin & McGregor, 2007). The Chinese government denied the

charge and a Foreign Ministry spokeswoman, Jiang Yu, said in Beijing that “the

Chinese government has consistently opposed and vigorously attacked according to

the law all Internet-wrecking crimes, including hacking. Some people are making

wild accusations against China ... They are totally groundless and also reflect a Cold

War mentality. China would like to work with other countries to take measures to

crack down on web crime” ("China denies U.S. charge it hacked Pentagon network,"

26 Trojan Horse is a malevolent program that poses as legitimate program with a back door allowing hackers to make changes to the systems it has infected.

Sniffer Packets & Firewalls 102

2007). When the attacks on Britain were denied in the Chinese Press, Yang Yi,

Director of the Institute of Strategic Studies under the National Defense University

was quoted as saying “China is a responsible country and we never do this kind of

despicable thing…As a matter of fact, China has never had so called military hackers.

Although we stick to the road of peaceful development, many countries still see China

with suspicion and guess subjectively if anything strange happens. China pursues a

defensive strategy and will never be the first to launch an attack. Any military move is

conducted in line with this strategy” ("Military expert: international cooperation to

fight hackers," 2007).

More allegations of officially backed Chinese hack attacks emerged in May 2008

from South Korea and India. South Korea also alleged that China was responsible for

54% of the attacks on the country ("Gov't transparency in quake relief not "forced

reaction" for hosting Olympics ", 2008). The Times of India reported that there were

attacks on Indian government and private computer networks (Bagchi, 2008).

These kinds of incidents are to a large extent played out in the international media.

There are few instances where direct conversations between officials from China and

the countries they have supposed to have hacked into are reported in the media, and in

general these are confined to official visits and are thus stage managed events by all

concerned. That is not to say that Merkel did not say anything to Wen during their

discussions. However, if they did discuss the hack attacks on German websites it was

not reported in the media. The point I am making is that international relations are

played out in the arena of the Internet through websites and news portals. The media

becomes a forum that charts and visualizes the relationship and it is via these outlets

that centre/margin relations are played out through the discussion of events like

hacking. The hacking of government websites by other governments also signifies a

virtual war and has opened up a new space in which nations are able to spy on one

another as well as a new space to fight over. Rather than just viewing international

relations as being carried out in official meetings and communiqués it is also played

out in the media and the Internet through official pronouncements on web sites and in

press releases, press conferences and door stop comments. World leaders read the

Sniffer Packets & Firewalls 103

papers, watch the television and monitor news on the Internet. It is way to

communicate without a direct conversation.

TaiwanThere have been reports about a virtual war going on between Taiwan and the PRC

since 1999 when Ian Buruma first reported on this (Buruma, 1999). In August of 1999

there were 72,000 cyberspace attacks launched from mainland computers, 165 times

with success (Buruma, 1999). At the time success meant placing a picture of the PRC

flag on the Taiwanese intelligence agency’s website (Buruma, 1999). In the same year

the “Ministry of Public Security in Beijing set up a special unit to combat enemy

hackers, or, as it was officially put, ‘to prevent an invasion of hostile forces’ (Buruma,

1999). In that year many of the attacks were triggered by statements by the Taiwanese

President Lee Teng Hui when he put forth the ‘two state theory’ where he was

suggesting that the Mainland and Taiwan should have a state to state relationship.

This was seen as a declaration of Taiwanese independence by Lee (Jame, 1999). In

2002 it appeared that Taiwan was the place where hack attacks into Mainland

television satellites were launched by Falun Gong ("Taiwan downplays China TV

hacking," 2002). In 2006 The Tapei Times claimed that Taiwan had suffered 250,000

cyber attacks between 1996 and 2006, making Taiwan the most hacked country in the

world.

Hacking in Taiwan had become such a serious problem by 2003 that Taiwan sent a

formal letter to the PRC to ask for help to track down hackers who had allegedly sent

a virus to the Taiwan based Eha Technology Limited software company via an email

("Taiwan asks China to help track hackers," 2003). The source of the emails was four

websites registered in Hubei and Fujian provinces. A letter was sent by the Straits

Exchange Foundation, a semi official organisation that handles Taiwan’s relations

with the mainland as there are no formal ties between the two countries. The letter

said “we would like the relevant authorities to help in quickly finding the motives, the

aims and the true identities of the perpetrators,” ("Taiwan asks China to help track

hackers," 2003).

In 2004 Taiwan’s Koumintang website was hacked into by a man claiming to be a

military veteran from the PRC. The website’s homepage was replaced with pro-China

Sniffer Packets & Firewalls 104

photos and China’s national anthem playing in the back ground. The new photos were

of a PLA soldier aiming a rifle at a target and another showed two men raising the

PRC flag (" Hacker gives Kuomintang Web site pro-Chinese look with PRC photos ",

2004). The hacker had also written “I’m proud of being a Chinese and a Chinese

veteran”(" Hacker gives Kuomintang Web site pro-Chinese look with PRC photos ",

2004).

The above represents some of the incidents that have been reported on hacking

between Taiwan and the Mainland. The use of the Internet and hacking signifies an

interaction between these two states and hacking in this way represents another arena

in which centre/margin relationships between the two countries is played out, and

fought over. The negotiation of this relationship happens on an official and unofficial

level and this arena is even more significant because there are no official channels of

communications between Taiwan and the Mainland. The limits of this kind of

interaction are difficult to gauge as there are no official figures on the number of hack

attacks that are carried out officially or otherwise. The media’s reporting of hacking in

this instance though provides a window on the way that the relationship is negotiated

between Taipei and Beijing. The mainstream media becomes the forum in which

these two countries discuss their differences and this is then rearticulated through the

Internet with news from wider number sources that exist, often on the same event.

The rituals of the state are also used in the centre/margin dialogue between the

Mainland and Taiwan. By this I mean rituals such as the opening of parliament or the

national days or state visits. There is ritual involved in all of these kinds of events and

they are reported in the media. These rituals of the state are also the foundations of

what Anderson calls the ‘cultural products of nationalism’ and these are the basis of

what he called imagined communities (Anderson, 1993) . For example dialogue is

orchestrated through official rituals such as the 17th Party Congress in October 2007

where Hu Jintao “called for a peace agreement with Taiwan under the one-China

principle” ("Peace pact with Taiwan proposed," 2007). In a report to the 17th National

Congress of the CCP Hu said “we would like to make a solemn appeal: On the basis

of the one-China principle, let us discuss a formal end to the state of hostility between

the two sides, reach a peace agreement, construct a framework for peaceful

development of cross-Straits relations, and thus usher in a new phase of peaceful

Sniffer Packets & Firewalls 105

development ("Peace pact with Taiwan proposed," 2007). The party congress is the

place in which these statements are articulated and the media is the vehicle through

which they are disseminated for consumption beyond the borders of the PRC.

Because of the lack of official channels between Tawain and the PRC the relationship

between the two is imagined in the media and these imagined communities slug it out

in a virtual space, that of the Internet and mainstream media that is then rebroadcast

across the space of the Internet. On an even more fundamental level the tensions of

the relationship are played out through hacking that on some levels appears to be

officially sanctioned.

TibetTibet is another sensitive topic on the Chinese Internet and the CCP go to great

lengths to define the parameters of what can and cannot be said on this topic in the

same way they define their relationship with Taiwan. There is no room for debate and

so it is not surprising that there have been incidents of hacking into the websites of the

Tibetan government in exile and the Tibetan Support Group (TSG) ("Tibetans allege

cyber invasion," 2004). The TSG claimed that the source of the attacks was the

official journal of the Tibetan administration in Beijing ("Tibetans allege cyber

invasion," 2004). In 2002 the Chinese government was first accused of hacking into

the Dali Lama’s computer network. The charges were vigorously denied by the CCP

whose response was “China opposes all forms of hacking”

A report in the Times of India claims that reports on the attacks of Tibetan exile

websites began in October 2003("Tibetans allege cyber invasion," 2004). In 2003 the

computers of Tibetan government in exile and their support groups around the world

were caught by a major virus attack and they alleged that it was the work of Chinese

government officials ("Virus attacks on Tibetan network; Chinese blamed," 2003).

“The International Campaign for Tibet said in a statement that it had traced e-mail

containing the virus to an Internet company based in Beijing. After the news of the

attack spread, the attackers changed mailing addresses two weeks ago, making them

appear to belong to Tibet support groups” ("Virus attacks on Tibetan network;

Chinese blamed," 2003). At the time the exiled government’s had a network of around

400 computers and was said to be well protected.

Sniffer Packets & Firewalls 106

In 2004 the Times of India ("Virus attacks on Tibetan network; Chinese blamed,"

2003) reported that Tibetan government in exile and support groups were attacked

again. This time hackers sent emails that appeared to be from other official Tibetan

websites, and they contained the Trojan Horse which is a hidden program that installs

malicious software on the recipient’s computer. The hidden program can then be used

to gain unauthorised access and do damage to a computer ("Trojan horse," 2006).

Following the riots in Lhasa in March 2008 there was another round of reports of

hack attacks on pro-Tibetan websites (Johnson, 2008).

The relationship between Beijing and Tibet is very similar to Beijing’s relationship

with Taiwan in that there are no official channels with exiled leaders for dialogue.

There are no formal channels between the CCP and the Tibetan government in exile

headed by the Dali Lama. The relationship is in part played out in the international

media and via Internet as these are the only channels for communication between the

Dali Lama and with the CCP. Again, this is carried out via press statements, press

conferences, and official websites. The media coverage of this dialogue and the

coverage of the hack attacks of the exiled government’s website are the arena in

which the centre/margin relationship between these two groups is played out.

China’s relationship with Japan is also played out virtually in the arena of the Internet

and hacking. In 2000 China was accused of hacking into Japanese government

websites and posting messages condemning Japan for the 1937 Nanjing Massacre.

The attack appears to have been triggered by a forum that was held in Osaka where

there was a denial that Japanese soldiers killed 300,000 Chinese citizens after the fall

of the city.

In the Annual Report to Congress on the Military Power of the Peoples Republic of

China addressed the future of nationalistic hacking in the PRC and concluded that:

Nationalistic hacking is likely to occur during periods of tension or crises. Chinese hacking activities likely would involve extensive web page defacements with themes sympathetic to China. Although the extent of Chinese government involvement would be difficult to ascertain, official statements concerning the leveraging of China’s growing presence on the Internet, and the application of the principles of “People’s War” in “net

Sniffer Packets & Firewalls 107

warfare,” suggest the government will have a stronger role in future nationalistic hacking”(Office of the Secretary of Defense, 2003)

Unofficial Nationalism & Hacking for the Nation

Hactivism within the context of the PRC goes beyond the state and is mostly based on

nationalistic sentiments. For example, a hacker defaced China’s Nike website in 2004

and left wishes for a happy new year in bold red letters in both Chinese and English

("Hackers Wreak Havoc with Nike," 2004). There was a suggestion at the time that

the attack was in retaliation for a Nike television commercial featuring a famous

American basketball player, LeBron James, battling animated dragons and Kung Fu

masters. The advertisement had been banned in China, and was described as an

“insult to the country’s national dignity”("Hackers Wreak Havoc with Nike," 2004).

Nike had also just been found to have plagiarised the design of a Chinese flash

animator and had been ordered to pay damages ("Hackers Wreak Havoc with Nike,"

2004)

The Southern Metropolis ran a story in October 2007 on a computer virus known as

the ‘patriotic virus’. The Win32/KillDPT (the patriotic virus), an update of the

W32.Welchia.B, is a virus that can decide to suspend the operating system of a

computer or create intrusive damage based on different languages used on the

computer. (D. Zhang, 2007). The virus enters the computer and assesses what kind of

operating system it has and what language the system is in. If the operating system is

in simplified Chinese then the virus is completely benign and will have no effect.

However, if the infected machine is running in Indonesian or Japanese the virus fills

the destroys the hard drive of the machine (D. Zhang, 2007). If the operating system is

in English the virus leaves a pop up message that reads “Your luck’s so good!” See

figure 4 below.

Sniffer Packets & Firewalls 108

Figure 4

(D. Zhang, 2007).

The virus has other nationalistic features such as declaring opposition to ‘Taiwan

independence’. If the virus is on a computer that uses traditional characters such as

those used in Taiwan a pop up will appear with “Down With A-bian!’ (Chen Shui-

Bian’s nick name) and other nationalistic pop ups such as “Comrade Chen Shui-bian,

you like Taiwan independence? Do you have any dignity or face? ... You want to be

condemned by history? Go away! We are Chinese! Even after death, our souls will

belong to China” (D. Zhang, 2007).

Nationalism & Hacking

Nationalism incorporates an historical past into the imagining of a community and

that is used to define and signify centre/margin relationships between nations. One

way this has traditionally been done is the way history is reconstructed via differing

nations, ‘ideological state apparatus’ (Aulthusser27), ‘official’ discourses of events,

all the things that construct a monopoly of knowledge. Interestingly, with regards

to China, Japan, Taiwan and Tibet, this is played out beyond the borders of each

nation and within these ISA’s via the hack attacks on these countries through the

27 ISA is defined by John Hartley as various social institutions that arise in civil society (the sphere of the private, as opposed to the state). They perform regulatory functions and reproduce ideology on behalf of the state. They include education, the family, religion, and the legal system, culture and communication. They are characterised by consent rather than coercion, and by their relative autonomy from the dominant economic class or its representative in the state (O'Sullivan, John Hartley, Saunders, Montgomery, & Fiske, 1994).

Sniffer Packets & Firewalls 109

choice of target, or the date of attack, hence confusing and altering - in a style similar

to tactics of culture jamming, the official version of historical events that are

sanctioned and subscribed to. For example, the competing versions qua voices of the

Nanjing massacre that triggered the attack sited above, the role and sovereignty of

Tibet or Taiwan have an historical context and the dates that are chosen are evidence

of the importance of the hegemonic use of history in the negotiation and contestation

of centre/margin relationships, by ISA’s and individuals hackers and hacker

collectives and in these instances are quite often officially sanctioned.

Analogue calendar time has and is still signified via events and anniversaries and

hence assisting the process of ’marking time’ and /or moment in time. The calendar

acts as a metaphorical marker for a historical ‘moment’ or ‘pause in time’ in relation

to a nation’s construction of it’s socio/economic/cultural and political history and

identity officially, and unofficially. Within the context of differing countries time

zones are based on the analogue calendar and their differences in marking

time are measured in a linear fashion. However, within the context of the Internet, the

digital (or net -time) transverses linear measured times zones, and the analogue

calendar. The Internet replaces it with the concept of near-instantaneity causing a

clash regarding, when and how something happens and means in which an event is

reported, distributed, consumed, altered, managed or circumvented by national

governments. Hacking into one another’s websites and challenging competing

versions of events of reality and carrying out virtual cyber wars is an example of this

where the issue regarding the above is dependent upon speed (in terms of

circumvention, management etc). This can be equated with Kern’s concept of the

simultaneity of experience in relation to experience, consumption and

reproduction, and also draws attention to Anderson’s mediation of Walter Benjamin’s

notion of empty homogenous time. Anderson (Anderson, 1993, p.24) writes that, “it

views time as something close to what Benjamin calls Messianic time, as a

simultaneity of past and future in an instantaneous present”. Anderson (1993, p.24)

goes on to say that the “idea of ‘homogenous, empty, time,’ in which simultaneity is,

as it were, transverse, cross, time marked not by prefiguring and fulfilment, but by

temporal coincidence, and measured by clock and calendar.” In the instances

described above within the context of the digital time via the Internet, we

Sniffer Packets & Firewalls 110

find national governments now competing and struggling with speed and simultaneity

in relation to their ISA management of events that comprise both digital and analogue

versions. In short, this has huge ramifications regarding the management of

information by nations trying to control the construction and reconstruction of

national events and officially sanctioned historical discourses regarding a nation in

terms of the past, and future.

Paul Virilio sees these things as a kind of convergence of time where local time and

history congregate in a single system to form what he calls global time. He writes that

“the very word ‘globalization’ is a fake. There is no such thing as globalization, there

is only virtualization. What is being effectively globalized by instantaneity is time.

Everything now happens within the perspective of real time: henceforth we are

deemed to live in a ‘one-time-system’ (Virilio, 1995). Vrilio goes on to argue:

For the first time, history is going to unfold within a one-time-system: global time. Up to now, history has taken place within local times, local frames, regions and nations. But now, in a certain way, globalization and virtualization are inaugurating a global time that prefigures a new form of tyranny. If history is so rich, it is because it was local, it was thanks to the existence of spatially bounded times which overrode something that up to now occurred only in astronomy: universal time. But in the very near future, our history will happen in universal time, itself the outcome of instantaneity - and there only (Virilio, 1995).

Foucault’s (1986, p.23) discussion of Heterotopias in Of Other Spaces is also relevant

here as heterotopias are a topology of sites “which are something like counter-sites, a

kind of effectively enacted utopia in which the real sites, all the other real sites that

can be found within the culture, are simultaneously represented, contested, and

inverted.” As Martin Procházka says that “as a result, instead of creating an

imaginative unity, the transversal, "cross-time" linkage of fragmentary discourses

generates the signs and images of otherness, cultural differences and heterogeneity,

which tend to be formalized and mythologized in contemporary discourses of

multiculturalism”(Procházka, 2006). So in this sense the Internet represents a

Sniffer Packets & Firewalls 111

heterotopic space in which time as history becomes heterogeneous as multiple

versions are juxtaposed and contested through hacking and rewriting in a single space.

Hactivism & Democracy

Hacking for the nation is tolerated to some degree as the above incidents reveal.

However, hacking is not tolerated when it directly challenges the CCP and their

monopoly on political power. Apart from the Falun Gong hack attacks there have

been few reports of hacking activity by democracy dissidents. The most notable

hacking case involving a democracy activist is that of Blondie Wong and the Yellow

Pages. In 1998 a group of North American hactivists, the Cult of the Dead Cow (cDc),

interviewed the reclusive leader Blondie Wong and the interview was published in

Wired magazine and other places on the Internet. In 1997 Wong, a dissident

astrophysicist living in Toronto, claimed to have disabled a Chinese satellite and was

planning to establish a global network of hackers to protest Western investment in

China (Hesseldahl, 1998). Wong is also alleged to have had “operatives stationed in

Shanghai, Hong Kong, and Beijing - including three ‘highly placed’ technicians

working in Beijing, and a handful of government bureaucrats, many of whom lost

family members at Tiananmen Square” (Hesseldahl, 1998). Blondie seems to have

vanished into the ether, as I can at the time of writing find no further details of his

exploits.

The Boston based hactivist group ‘Hactivismo,’ an international group of activists

dedicated to hacking for human rights and free speech, claimed to have members in

the PRC. In July 2001 they announced in the preamble to their declaration that:

Hacktivismo and the CULT OF THE DEAD COW have decided that enough is too much. We are hackers and free speech advocates, and we are developing technologies to challenge state-sponsored censorship of the Internet” Most countries use intimidation and filtering of one, kind or another including the Peoples Republic of China, Cuba, and many Islamic countries. Most claim to be blocking pornographic content. But the real reason is to prevent challenging content from spreading through repressive regimes. This includes information ranging from political opinion, "foreign" news, women’s issues, academic and scholarly works, religious information, information regarding ethnic groups in disfavor, news of human rights abuses, documents which present drugs in a positive light, and gay and lesbian content, among others (""A Special Message of Hope"," 2001).

Sniffer Packets & Firewalls 112

Hactivismo aimed to have people in China, and other countries where there is heavy

Internet censorship, post content, using steganography, that would otherwise be

filtered in plain view by hiding the content in websites that would be acceptable to

authorities. Ruffin, a member of Hactivismo, said that “Steganography is a kind of

encryption that allows one to bury digital content in a digital content base. Think of a

Web page displaying a picture of the Mona Lisa. Steganography would allow you to

hide a copy of the Declaration of Independence, an MP3, or any other piece of content

digitally rendered in Da Vinci’s masterpiece” (Ruffin, 2004). The application was

called Camera/Shy and was dedicated to the memory of Wang Ruowang, a former

Chinese dissident leader.

Hactivismo has developed other tools to assist Chinese citizens circumvent the Great

firewall, one of those was called Six/Four, a direct reference to the 1989 Tiananmen

Demonstrations and the colloquial term for the massacre on June 4, 六四 literally six

four. The Six/Four protocol is a peer to peer system like those used to share music

files across the Internet. This allows users to create a virtual network on the Internet

that is invisible to all but its own members ("Hackers target web censorship," 2002).

Another tool they have developed is ScatterChat a secure instant messaging service.

In Hactivismo ("Hacktivismo Launches ScatterChat for Secure, Private

Communication," 2006) press release for the service they said that:

ScatterChat is unique in that it is intended for non-technical human rights activists and political dissidents operating behind oppressive national firewalls. It is an instant messaging client that provides end-to-end encryption over the Electronic Frontier Foundation-endorsed Tor network. Its security features include resiliency against partial compromise through perfect forward secrecy, immunity from replay attacks, and limited resistance to traffic analysis, all reinforced through a pro-actively secure design.

In February 2006 Hactivismo also kicked off a campaign against Google and their

censoring of the Chinese Internet by encouraging people to print up T-shirts with the

graphic below (Fig 5).

Sniffer Packets & Firewalls 113

Figure 5 Googlag altering of Google logo.

("cDc launches global campaign against Google," 2006)

There are also stories in the Western press that allege that Chinese authorities are

hacking the email of dissidents. In 2005 the story of Chong Yiu-kwong, a key figure

in the Civil Human Rights Front in Hong Kong, claimed that hackers from within the

Mainland had been tampering with his e-mail account ("Hong Kong Activist Says

Chinese Hackers Read His E-mails ", 2005). In 2005 Chong told Radio Free Asia that

his Internet activities had been monitored by someone within the Mainland since

April 2004. He said “I didn’t know that my computer had been monitored ever since

[April 2004], until I found that all my e-mails from the account registered to the

University of Hong Kong disappeared all of a sudden ("Hong Kong Activist Says

Chinese Hackers Read His E-mails ", 2005). Following his discovery Chong

approached the computer center of Hong Kong University. He said “they told me that

my account had been monitored by three different IP addresses from China and that

information from the account had been downloaded every few minutes”("Hong Kong

Activist Says Chinese Hackers Read His E-mails ", 2005).

ConclusionTracing the activities of democracy hactivists is tracing the negotiation of

centre/margin relationships and the way that these have been reconfigured in space by

the advent of the Internet. These groups are scattered across the globe and have come

together with a common interest to test the limits of a centre identified as

China/Beijing. The outcome of cDc and Hactivismo has not resulted in the tumbling

of the CCP and the beginning of democracy despite their best efforts.

The writing of viruses and hacking into computer networks represents the most direct

challenge to any network. In essence hacking is about creating disruption on a

network or even its breakdown. The challenge to code in this way comes from many

Sniffer Packets & Firewalls 114

groups, criminals, hactivists and the military. In the case of China there is little

evidence to suggest that the Internet has been used in this way to over throw the

government and replace it with democracy. Even though hacking is illegal in China

and the government denies that there have been any officially authorized attacks,

there still appears to be sufficient evidence to suggest that there are officially

sanctioned hack attacks that have taken place. The hack attacks by the Honker’s

Union appear to be officially sanctioned.

Sniffer Packets & Firewalls 115

C h a p t e r 7

Disasters & Starbucks

There have been a number of incidents since the Internet emerged as a popular

medium where news stories have broken on the Internet first, circumventing

traditional informational flows, or where the Internet was a feature of the occurrence

itself. This includes incidents such as the Belgrade Embassy bombing in 1999 where

the story first broke on the Internet and the Falun Gong demonstrations in 1999 at

Zhongnanhai where the protest was organised online. Both of these stories also made

their way into the international press and then were played out to some degree online.

There have been incidents since that challenge traditional informational flows, and it

is my aim in this chapter is to map the ways in which these kinds of incidents have

been dealt with by the CCP. I also wish to look at how the incidents have challenged

the CCP’s monopoly over political power and the way they have been used by the

party to preserve their position and power. The examples used here show how the

Internet can be viewed as both liberating and a tool of repression and serve as

practical illustrations of the ways in which code, content and regulation are used to

maintain the CCP’s authority and the way in which time as the official version of

events is used to manage spatial relationships with provincial and local governments.

In addition to this the case studies allow me to map the double rearticulation of the

incidents as they are played out on the Internet in a more international forum. By this

I mean the way that the stories are covered and articulated for the domestic and

international audiences, as well as those that play out international relations. In these

instances the stories are used to speak to many different kinds of audiences, for

different political purposes. For this it is necessary to look at who is speaking and to

whom and in which forum? For example in January 2002 George W. Bush, in his

State of the Union address named Iran Iraq, and North Korea as a part of an axis of

evil ("The President's State of the Union Address ", 2002). This was only four months

after the September 11 attacks, and he was speaking to a domestic audience. In China

the speech was not well received, and President Bush was criticized for using

inflammatory language ("China Disapproves Use of 'Axis of Evil' in International

Relations," 2002). During George W. Bush’s visit to China in February 2002 there

were no official talks on the issue and the visit was hailed by both sides as a success

Sniffer Packets & Firewalls 116

as the American President made his way through a number of staged events that are a

part of any official visit by the head of state to any country. So the strong rhetoric

used by Bush was for a domestic audience and the remarks were toned down for an

international audience.

The management of informational flows on the Internet in China are tied to existing

discourses, and the way they are dealt with is consistent with the CCP view of those

discourses. That is, news is guided by the CCP and subverted for political purposes in

order to reinforce and help maintain the CCP’s position of authority, and content on

the Internet is developed in accordance with this. As a consequence of this journalists

in China are able to investigate and evaluate certain issues, however the media is not

permitted to comment on general or universal problems. Journalists can say what they

like so long as they do not criticize the government. Anne-Marie Brady says that “the

propaganda line is saying that investigative journalists in China can talk about local

problems, but can’t look at systemic change” (in Funnell, 2007). In this sense it is

therefore allowable to investigate corruption, but not to comment on the problem by

identifying underlying shortcomings of the system, such as the lack of the rule of law.

This is not to say that journalists are passive in this process, and of course they are

constantly pushing the boundaries. For example papers such as the Southern Weekend

(南方周末 ) have a well deserved reputation for colourful investigative reporting,

however in order to stay in print the paper does not act as a watchdog, and the

government has at times sacked staff and there is always the potential threat of being

closed down.

The CCP’s strategies for the maintenance of their position of authority is to attempt to

maintain control over the narrative of events, so as to guide public opinion, and this is

done chiefly through the development of content. In this sense time is a Meta

narrative that is used to describe the way in which history and the narrative of events

unfold in the media and the way in which the CCP seeks to maintain control over the

narrative of those events. The notion of time or the Meta narratives used to control

time form the basis of the monopoly of knowledge used by the CCP to control space.

The management of time is necessary for the continued perpetuation, replication and

legitimation of a particular political system over space. This is the underlying theme

of the relationship between elite politics and the media in China. The media is one of

Sniffer Packets & Firewalls 117

the means by which time and space are managed and is the means by which policy is

articulated and disseminated. The media also forms a space in its own right and

provides a forum in which factional struggles of elite politics are played out. As such

the media are the mechanism through which the current reality is constructed. This

reality is a ‘communist’ reality, which at present is subject to market forces with

‘Chinese characteristics’. Content is developed in accordance with this and thus the

desire to manage the narratives of history can be understood within this context.

These narratives are used to unify the nation.

The coverage of the incidents that make up the examples in this section can be

thought of in three ways as they relate to the strategies employed to maintain power.

Incidents that are tied to broader campaigns aimed at reinforcing central authority,

nationalistic incidents and incidents that represent dissent. As Brady points out

“amongst the toolkit for the party’s bid to maintain power are a renewed emphasis on

nationalism, including strengthening notions of both the foreign Other and the

Chinese Self: an ongoing effort to present a negative picture of post-communist

societies in order to bolster fears of the potential for chaos in China if the CCP was

overturned: image building activities in order to mould public opinion in favour of

both the CCP and the PLA: as well as targeted campaigns focusing on perceived

threats to CCP power, such as Falungong and Muslim separatists in Xinjiang” (Brady,

2002).

Jiangxi School Explosion

In March 2001 a school exploded in Fanglin village in Jiangxi Province killing 42

students and teachers and injuring 27. The official government version of the event

was that a suicidal madman went into the school with two sacks of fireworks, and

blew himself up along with the school ("Truth About Jiangxi School Building

Collapse Known," 2001). The People’s Daily (Renmin Ribao) also reported that

officials had done a good job of handling the situation ("School Explosion Aftermath

in Jiangxi Well Handled," 2001). This lies in stark contrast to the first reports of the

accident that were released by the Guangzhou media, including the Southern Weekend

and later picked up by the foreign press in which it was reported that the school had

been forcing students to work producing fireworks in order to subsidize their

Sniffer Packets & Firewalls 118

education when the explosion occurred. Following the breaking of the story in the

Chinese press foreign journalists descended upon the area and parents told them of

their complaints to the authorities about this dangerous situation for three years

("School Blast Parents in China Furious Complaints Went Unheard," 2001). The local

police sealed off the town from foreign press and the Foreign Ministry branded the

overseas media reports as “absurd and erroneous”("China Slams Local, Foreign

Media Over School Blast," 2001). The then Prime Minister Zhu Rongji appeared on

television to apologise and to tone down accusations of child labour. The official

version of events was further undermined by the discussion of the tragedy on Internet

Chatrooms within China until these were closed down by the sites owners for fear of

the wrath of the government ("Internet Challenges the Party Line in China," 2001)

This event and the manner in which it was dealt with by the Chinese authorities

highlights the challenges the Internet represents to the management of informational

flows within China and illustrates some of the strategies employed by the CCP to deal

with what they perceive as being a negative consequence of the technology.

The Jiangxi School explosion was one of the first disasters to escape traditional

informational flows in this way and it illustrates some of the consequences of the

Internet and the way in which the CCP has adapted to a changing communications

environment. That is the story broke and circumvented traditional media flows and

the CCP responded by asserting Beijing’s authority over the story by emphasizing a

particular version of the event. There have been numerous instances since the school

explosion including the Nandan mine disasters in 2001, later the SARS out break in

2004, and more recently the Black Kiln incident in 2007, which is discussed at length

later in this chapter. The explosion of the school illustrates the way in which the CCP

has adapted and subverted the technology so as to construct a CCP version of the

events and retain dominance over the management of information. There was in this

instance a tension between people of Wanzai County and the central authority in

Beijing and it was quickly silenced. To some extent the incident was rewritten as

authorities circulated an official version of events that was contrary to the version

circulated by the parents who lost their children in the tragedy and the media that

descended on the village after the accident.

Sniffer Packets & Firewalls 119

Starbucks

In 2000 Starbucks opened an outlet near the Forbidden City in Beijing triggering a

debate about the coffee chain’s location on the Internet. The popular portal Sina.com

ran a survey that found “over 70 percent of nearly 60,000 people surveyed were

opposed to the cafe’s entry into the Forbidden City, the main reason being the

damaging effects to Chinese cultural heritage and its atmosphere” ("Starbucks Cafe in

Forbidden City Under Fire ", 2000). The debate died down and Starbucks removed a

large sign and became inconspicuous within the palace museum.

In 2007 the debate was kicked off again by a blog entry by CCTV English Channel

newsreader Rui Chenggang. The blog entry, “Why Starbucks Needs to Get Out of the

Forbidden City?” attracted 530,000 hits and thousands of online responses and

according to the Peoples Daily Online. Most of the comments were against the

location of Starbucks arguing that it was damaging to the historical site. Rui wrote

that “it is not globalizing, but trampling Chinese culture to have a Starbucks in the

Forbidden City, a symbol of Chinese civilization” ("Starbucks should be verboten in

Forbidden City, say netizens," 2007) .

In March 2007 the Starbucks debate was raised during the National People’s Congress

when a deputy from Heilongjiang province, Jiang Hongbin, submitted a motion to the

Congress to close the outlet. He was quoted by the China Daily and Xinhua as saying

that "the Forbidden City is one of the un-tradable products as its value cannot be

measured with money. As long as it (Starbucks) stays in the imperial palace, it poses a

challenge to our traditional culture”("Lawmaker calls to remove Starbucks from

Forbidden City," 2007).

The story was picked up by the foreign press and featured on many western news

sites, including CNN, The Guardian, The Financial Times and the Daily Telegraph.

Some of the foreign press coverage suggested that the posting and the ensuing debate

were in the lead up to forthcoming renovations and the Olympic Games. The

suggestion was that the museum wanted Starbucks out for final renovations and the

games and that Starbuck’s presence in the palace was much more inconspicuous than

that of American Express who has advertising throughout the museum. The question

of the location of the Starbuck’s was also used by the People’s Daily Online to

Sniffer Packets & Firewalls 120

generate discussion, as a banner on the website for about six months and in one article

suggested that it was a campaign to kick the franchise out of the palace museum. On

the 15th of July the outlet was closed after negotiations with the company.

The calling for the removal of Starbucks in the Forbidden City easily taps into

Chinese nationalistic sentiments and the way that the story was presented and played

out implies a level of official encouragement and is illustrative of the way in which

the Internet has been used to develop content as a part of the CCP’s management

strategies for the Internet. Starbucks decision to move from the site seems to confirm

this as well. In addition Rui is a Party member, and the promotion of the debate by the

People’s Daily Online is further evidence of official sanctioning. This invocation of

nationalist sentiment tied to the protection of an historical past is a common feature of

the Post Mao era and is used to unify the country in the decline in the importance of

ideology. According to Brady, “throughout the 1990s, CCP propagandists worked to

foster a sense of antagonism towards Western countries, especially focusing on the

imperialist past. Numerous books, films, television programs, and exhibitions

continually reminded Chinese citizens of the wrongs enacted against Chinese society

by foreign countries”(Brady, 2002, p. 3). This process of Othering is used to actively

reaffirm and define ‘Chineseness’ as sanctioned by the CCP. The encouragement of

Nationalistic sentiments gives the appearance of an open debate, even though debate

is engineered to reaffirm support for the CCP as the guardian of the national Chinese

identity. The active contsructedness of identity in a nationalistic way uses history to

give authority to present actions and is as Benedict Anderson suggested a part of the

way in which a political community is imagined (Anderson, 1993). In terms of the

management of time and space history is often used to justify the present in the

manufacture of consent. Niectzshe said “knowledge of the past is at all times needed

to serve the present and the future, not enfeeble the present or to tear out the roots of

the vigorous powers of life for the future”(in Harold A Innis, 1951, p. 61). Time with

regaurds to this incident was used to manage space as China’s historical past was used

to serve the needs of the present in order to move Starbucks out of the Palace Museum.

The Black Kiln ScandalIn June 2007 somewhere between 548 and 600 people including an estimated 51

children, some as young as 8, were rescued from slavery in Shanxi and Henan

provinces. The story unfolded over several months before breaking nationally, it first

Sniffer Packets & Firewalls 121

emerged in April with a report in the Democracy and Legal Times (Minzhu yu Fazhi

Shibao 民主法制时报) on the large number of illegal mines operating in Shanxi

province. On the 18th of May 2007 Zhengzhou television reported on a group of

parents claiming that their children had been kidnapped and sold into slavery to work

in illegal coal mines and brick kilns. The following day 1000 parents turned up at the

television station asking for help to find their children. On the 7th of June 400 parents

posted an open letter on the Dahe net and then on the Tianya Club website claiming

that their children had been abducted and forced to work in illegal brick kilns. The

parents had attempted to free their children but had been frustrated by local police and

authorities. The story was then picked up nationally as rescue stories appeared in the

media and fuelled an outburst of public anger in support of the parents and calls on

the central government to address the situation. A crackdown was launched

nationally, with the main focus on Shanxi and Henan and targeted brick kilns and coal

mines. By the end of June there were numerous reports of slaves being freed from

illegal mines and brick kilns. Initial reports of the crackdown on the 16th of June said

that “a total of 468 workers, 251 in Shanxi Province and 217 in Henan Province, who

were forced to work as "slaves" have been freed from brick kilns and other illegal

work places” ("Central government forms work team to investigate into "slave labor"

incident," 2007). The People’s Daily reported on the 21st of June that “about 45,000

policemen had raided more than 8,000 kilns and small coal mines in the two

provinces and freed 591 workers, including 51 children”("China to launch nationwide

labor investigation after "brick kiln scandal"," 2007). Officially there was also an

estimated 1000 children across the country that may have been sold into slavery

("China brickwork slave children may number 1,000," 2007).

An investigation into the scandal was launched and sanctioned by Hu Jintao and Wen

Jiebao, as both leaders were said to be watching over the situation personally, further

highlighting the leadership’s commitment to the situation. On June 20 Wen Jiabao

presided over a meeting of the State Council where a preliminary report was handed

down on the handling of the incident. The report was compiled by an investigation

group made up from the “Ministry of Labour and Social Security, the Ministry of

Public Security and the All-China Federation of Trade Unions” ("Shanxi governor

makes self-criticism for slave labor," 2007). It was decided that those involved

should be severely punished, and the Shanxi government was ordered to step up the

Sniffer Packets & Firewalls 122

investigations and compensate the victims. Yu Youjun, Governor of Shanxi Province,

also made a self-criticism on behalf of the Shanxi government. The meeting also

urged local governments to learn a lesson from the scandal ("Shanxi governor makes

self-criticism for slave labor," 2007). The governor later chastised the “local publicity

department for failing to respond quickly to the media when news of the brick kiln

forced labour scandal hit the headlines”("Shanxi governor criticizes publicity officials

for handling of media during forced labor scandal ", 2007).

In the early phase of the campaign The Internet Bureau, CPC Central Office of

External Communication when they issued the following instructions to websites on

the 15th of June:

All External Communication Offices, Central and Local Main News Websites: Regarding the Shanxi “illegal brick kilns” event, all websites should reinforce positive propaganda, put more emphasis on the forceful measures that the central and local governments have already taken, and close the comment function in the related news reports. The management of the interactive communication tools, such as online forums, blogs, and instant messages, should also be strengthened. Harmful information that uses this event to attack the party and the government should be deleted as soon as possible. All local external communication offices should enhance their instruction, supervision and inspection, and concretely implement the related management measures (Ming, 2007).

Despite the above statement the reporting of the incident was bold even in the staid

official state press such as the People’s Daily and the China Daily. The Southern

Daily (Nanfang Daily 南方报业) and its weekend version Southern Weekend carried

graphic images of the some of the victims and parents holding photos of their lost

children. There were also graphic images of the injuries victims received at the hands

of their captors. The slaves had been beaten and held captive by vicious dogs, and

forced to live in intolerable living conditions. The coverage in the Southern Daily and

Southern Weekend featured personal stories of traumatised victims, rather than

focussing on government measures to liberate the slaves and bring those behind the

incident to justice which was the focus of the Peoples Daily. The reporting of the

incident by the China Daily was very candid: and featured editorials berating the

Sniffer Packets & Firewalls 123

government for inaction and accusations that local authorities in Henan had attempted

to muzzle the media ("China orders crackdown on labor abuse," 2007). On the 18th of

June the Xinhua Newsagency ran an opinion piece that was also published on the

People’s Daily website, which berated the government and labour protection officials

for allowing the abuse to happen. The editorial said “it is high time the government

stepped up labour protection and spurred idle officials to do their jobs properly if we

are to come even close to building a ‘harmonious society’(Yan Zhou, 2007).

There appears to be a level of open debate about what the government should do,

however, the incident was used to advance a line on certain issues by the Party and to

reassert Beijing’s authority of the margins, specifically provincial/local governments.

The crackdown was national and involved the exposure and closure of illegal factories

and kilns in Wuhan, and Xinjiang and the closure of job agencies in Xian. Much of

the criticism for supporting illegal activities was blamed on local authorities. In an

article that was repeated on the China.org and China Radio International websites

the Vice-Minister of the State Council Information Office Wang Guoqing, , said that

“ ‘blocking bad news’ was becoming more difficult, given the wide use of new

information technologies such as the Internet, mobile phones and the central

government’s commitment to information transparency”(W. Liu, 2007).

The campaign that followed the breaking of the story was carefully engineered to

unify public opinion behind the central government on a number of fronts, including

greater media transparency, the release of laws on the reporting of disasters and the

adoption of the Emergency Response Law, requiring officials “to provide accurate,

timely information on emergencies” ("Road of free information flow cautious but

resolute," 2007). At the time there was also a campaign to ban cheap bricks, and the

tightening of regulations on official corruption. There were also calls for the

promotion of migrant workers rights and the unionizing of labour; and the banning of

slavery and child labour and this was followed up with new labour protection laws. In

July Xinhua reported that the All China Lawyers Association (ACLA) had called for

slavery to be incorporated into China’s Criminal Law (Y. Sun, 2007b). In the previous

April “China adopted regulations on ‘open government information’ that were

intended to promote “public access to information on a range of issues including

government spending, drug and food safety, and land seizures. These new regulations

Sniffer Packets & Firewalls 124

were intended to curb the abuse of power. The media decree takes effect in May 2008,

three months before the Olympics” ("Road of free information flow cautious but

resolute," 2007).

The Black Kiln incident was used to call for a greater role of the media in coverage of

accidents and disasters. An official of the Supreme People’s Procuratorate said that

“our past experiences have shown that dereliction of duty is always behind major

accidents. Prosecutors should learn to investigate official negligence when major

accidents are exposed by media” ("China investigates dereliction of duty in forced

labor scandal," 2007).

On the 24th of June it was announced by the Chinese press that draft laws for the

reporting of disasters and accidents had been discussed by the Standing Committee

for the National People’s Congress for a second reading. “Emergencies are defined in

the draft as industrial accidents, natural disasters, and health and public security

crises”(Y. Sun, 2007a). It was reported in the People’s Daily that the legislation was

hotly debated particularly the provision on the “news media that irregularly report the

development and handling of emergencies without authorization or release fraudulent

reports will be fined between 50,000 yuan (or 6,250 US dollars) and 100,000 yuan, if

the reports lead to serious consequences (Y. Sun, 2007a). The People’s Daily

suggested that “some said information transparency is crucial to handling emergencies

and that the media’s contribution should be affirmed and praised”(Y. Sun, 2007a).

The report went further by saying that “the expression "irregular reports" was

ambiguous, and could be used by some local governments as an excuse to prevent

objective reporting by news organizations. Media supervision was needed to ensure

that government officials did not hide or misrepresent information regarding

emergencies, they said”(Y. Sun, 2007a). The report concluded with “currently,

China’s media are providing timely reporting on emergencies, such as bird flu cases,

coal mine accidents, explosions and air crashes (Y. Sun, 2007a).

The dereliction of duty of officials is a theme of the draft laws for reporting accidents

and disasters and this fitted in well with a continuing crackdown on corruption. On

June 22 Xinhua reported that China’s Supreme Peoples Procuratorate was planning to

amend the criteria for major cases of power abuse or the dereliction of duty (Han,

2007). Professor of Sociology, Xia Xuelan of Beijing University was quoted by

Sniffer Packets & Firewalls 125

Xinhua as saying that “some officials, bought off by illegal brick kiln owners, who are

usually powerful and wealthy, tend to harbour them and turn a blind eye to their

vicious conduct….noting that exposure of this case should be a warning to them”

(Han, 2007). Much of the outrage was directed at local officials and police who had

been complicit with kiln owners in the scandal.

Workers’ RightsThe public shock and disgust at the treatment of migrant workers was fuelled to

support workers’ rights and safety. China’s army of migrant workers and the abuse

that they suffer is often tied to rising social unrest and riots, and so the protection of

workers rights is increasingly seen as essential to the promotion of ‘social harmony’,

Hu Jintao’s slogan to promote stability28. The number of migrant workers is

increasing steadily as more and more people move to the cities to try and find work,

and is also tied to income gap which is perceived by the CCP as one of the most

significant problems facing the stability of the country. In light of this the Black Kiln

crackdown/campaign called for an increased role for trade unions in the PRC, and this

was followed up by legislation. Labour officials came under fire in an editorial in

Xinhua that said “first of all, labour protection officials must shoulder a large portion

of blame. They are paid to ensure that workers’ rights are protected through a labour

contract with their employers, minors are not employed, weekly working hours do not

exceed 40 and all workers are paid on time and in full” (Yan Zhou, 2007).

The Black Kiln incident and the crackdown also appeared around the same time that

accusations were being levelled at China for using child labour to produce official

Olympics products and the government made assurances that they would investigate

the claims. The crackdown on the illegal brick kilns and mines and the liberation of

slaves gives credence to the idea that the government was seen to be doing something

about stamping out the practice of child labour. This then speaks to both a domestic

and international audience. Domestically it is the communicating of the policy on

child labour, and internationally it signals the government policy. The crackdown and

the way it is played was out in the media is a visualisation of the articulation and

negotiation of centre/margin relations. It is the central leadership of the CCP in

28 Social Harmony has not been full articulated at this stage, but is a slogan used to address issues that are the potential source of social unrest.

Sniffer Packets & Firewalls 126

Beijing articulating and reinforcing their position in their relationship with the

provincial and local governments at the margins. In addition it is the playing out of

foreign relations in the same way that is media announcements are the visualisation

and articulation of the Beijing’s relationships with the international community.

The apparent openness with which the Black Kiln incident was reported can best be

understood against the broader backdrop of policy changes with regards to the

development of socialist democracy and more political openness. There have been

some signals at the top that there are moves towards greater public participation in

politics. This is evident in the calls for transparency in the reporting of disasters.

There was further evidence at the opening session of the National People’s Congress

in March 2007 when the Peoples Daily said “Chinese leaders have stressed on many

occasions that to build a ‘harmonious socialist society’, which features “democracy, a

rule of law, equity, sincerity, fraternity, vitality, stability and the harmony of human

and nature”, is a historic task of the country ("China's parliament starts annual session

with focus on social harmony," 2007)”. At the end of June 2007 Hu Jintao

emphasised the significance of putting into practice “the scientific concept of

development, promoting social harmony and building an overall well-off

society”("China's parliament starts annual session with focus on social harmony,"

2007). Hu said “to develop socialist democracy is our long-term goal. The

government should expand political participation channels for ordinary people, enrich

the forms of participation and promote a scientific and democratic decision-making

process"("Chinese president delivers keynote speech on national development ",

2007). Hu made the remarks in a speech at a senior course for ministerial officials and

provincial heads at the CCP Central Committee’s Party School, setting the tone for

the 17th national congress of the CCP to be held in 2007.

There is evidence that experimentation is going on with public consultation. New

policy initiatives are generally experimented with at the margins29 for example the

Xiamen PX development discussed in chapter 5 is confirmation of experimentation

29 See Goodman and Segal China Deconstructs: Politics Trade and Regionalism

Sniffer Packets & Firewalls 127

with new forms of public consultation. Other examples include the June 2007

announcement of the establishment of a national centre to receive petitions and

public complaints ("China to establish national centre to receive public complaints,"

2007). There was also the setting up of a website to receive complaints of official

corruption, and this crashed within hours of opening.

It is important to emphasise once again that the reasons for what looks like, for all

intents and purposes, a move towards an opening of the political system is not solely a

consequence of the development of the Internet, but rather must be contextualized

against broader historical and political developments. The Beijing Olympics in 2008

for example is an opportunity to showcase the country and the achievements of the

Open Door policy in regards to the development of the country and is of the utmost

importance to the CCP. This showcase is not just for an international audience but an

opportunity for the leadership to bask in the light domestically for their

accomplishments, and to consolidate the currents leaderships place in history. This

event alone highlights internationally human rights in the country and the leadership

of the CCP appears to be eager to show the world that things have and are improving

in this area. Ultimately though the goal of the leadership is to maintain what they call

‘social harmony’, and this does not necessarily mean the CCP is ready to let go of

their position as the final voice in Chinese politics. Any discussion of democracy by

the CCP is underscored by the phrases ‘socialism with Chinese characteristics’ and

Hu’s referral to ‘socialist democracy’ and this does not mean that the leadership is

moving towards a liberal style democracy.

In the run up to the 17th Party Congress the media was reminded to remember that

their duty to is to guide public opinion ( 舆论导向 ). On August 22 the Guangming

Daily (光明日报), run by the Central Propaganda Department, and several major

Websites ran a speech by Yuan Zhifa (袁志发) a former editor of the Guangming

Daily in which he reiterated the party line on the role of the media, he said:

Guidance of public opinion is the lifeblood of news propaganda. Correct guidance of public opinion means the prosperity of the party and the people, while incorrect guidance spells disaster for both. The question of

Sniffer Packets & Firewalls 128

correct and incorrect guidance concerns the fate of the party and the country (in Bandurski, 2007a).

History Revisited the Karamay Fire

The final example here is of the Karamay fire in 1994 and the storory’s re-emergence

on the Internet in 2007. The significance of this story highlights the contradictory

nature of the media in China and how the past and re-writing history can be used to

serve the interests of the present. In 1994 an estimated 288 children perished in a fire

at a Karamay theatre after the children were instructed to remain seated so that

officials could leave after the blaze broke out. At the time the tragedy was blamed on

locked exits and a lack of safety checks to organise a safe evacuation. A documentary

made on the disaster was posted by its maker Chen Yaowen, a reporter for China

Central Television and generated a lot of discussion and disgust on the Internet.

Chen’s attempts at filming the report were often thwarted by local officials and the

reluctance of victims to talk to him after being pressured by officials.

The former president of CCTV Yang Weiguang (杨伟光) gave an interview about his

role in the reporting of the fire to Southern Weekend which was translated by China

Digital Times, he said:

At certain times, there’s a delicate question of balancing the "degree." Otherwise, what do we call censorship? The most typical example was, when some kids died from a fire in Karamay (克拉玛依). I finished the program and thought it was well done and very touching. But I said, there are some passionate emotions in Karamay there. I said, if this program is aired, will it calm down the emotions of the local public, or it will add fuel to the fire? If it’s adding fuel to the fire, then we cannot broadcast it. If it can calm things down and it won’t trigger some unrest, then we can air it. The problem is, the situation over there was red hot, and if you air this, it will anger the parents of the kids and add pressure to local officials. And the reporter of the program wept with a sunken head. Three days later, the Central Propaganda Department issued an official notice, banning reports about the accident. And people said that I did the right thing to kill the program (Zhao, 2007).

Sniffer Packets & Firewalls 129

The Karamay fire and its re-emergence, which was not long after the Black Kiln

incident, can also be seen as in terms of the visualisation of centre/margin

relationships, as this story was also used to bolster public support for the reporting of

disasters legislation, and the reinforcing of Beijing authority over local authorities.

Overall the incidents and the official narratives constructed to manage these events

and the governments responses to those events were used by the leadership of the

CCP in Beijing to assert their authority over local and provincial governments. The

incidents here and the CCP handling of those events amount to PR spin that is used to

manage time as a narrative of a current event and that is used to assert authority over

spatial relationships. The public response on the Internet to the re-emergence of the

story is also a visualisation of the public and public opinion.

Conclusion

The appearance of debate is a common feature of the Black Kiln incident, the

Karamay fire and the Starbucks campaign. The use of BBS and websites to reveal and

promote give the appearance of a debate and have led some writers to suggest that this

is evidence of this kind represents the potential formation of a civil society (Tai, 2006;

Yongming Zhou, 2006). Because these forums are tightly censored postings identified

as contrary to the government line can be quickly erased. The Jiangxi school

explosion demonstrates just how quickly voices can be silenced if the government has

a will to do so. Again this indicates that any liberalisation of government policies is

not necessarily a consequence of the Internet but rather willingness by the government

to reform. This is a clear incident of the relationship between the management of

informational flows and the management of time and space.

Sniffer Packets & Firewalls 130

C h a p t e r 8

The Management of China’s Blogosphere 博客 boke (Blog)

‘When you open the window, some flies may come in’ (打开窗户,苍蝇可能会飞进

来) Deng Xiaoping on the Open Door Policy.

Blogs or weblogs are online journals that are regularly updated, and cover thousands

of topics. In a way Blogs represent the free speech philosophy of the early days of the

Internet in that they allow users to distribute opinion on an enormous variety of

topics, and in some countries relatively uncensored opinion, though potentially they

can be monitored everywhere. The blogosphere creates a new space in which public

discourse can be widened and viewed. Indeed my research for this thesis has relied

heavily on an excellent blog called EastSouthNorthWest, where a variety of articles

from China’s media are translated and posted, with some comment and analysis.

During the Burma protests in September 2007 blogs were one of the few sources of

information about the unrest not directly controlled by the Junta. Reporters without

Borders claims on its website that “Bloggers are often the only real journalists in

countries where the mainstream media is censored or under pressure” ("Handbook for

bloggers and cyber-dissidents ", Unknown).

Authoritarian regimes are often cast by western media as under threat from the

Internet and more recently blogs have been hailed as the final nail in the coffin of the

CCP, though so far this has not happened. This chapter will look at the regulations

and the promotion of self-censorship to manage China’s Blogosphere. The strategies

are the same as those employed to manage the flow of information and the circulation

of ideas as outlined in chapter 4 and that has been through the development of

content, regulation and the code and architecture itself as means of filtering and

censoring information. This chapter also looks at the way in which centre margin

relations have been played out in relation to the development and management of

blogs and how the strategies of content development, legislation and code are used to

maintain the CCP’s influence over time and space.

Sniffer Packets & Firewalls 131

Technocrati, a blog search engine, says that globally they are “currently tracking

101.3 million blogs and over 250 million pieces of tagged social media ("Welcome to

Technorati," 2007). At the end of 2006 Xinhua reported that there were 20.8 million

bloggers in China and of those 3.15 were said to be ‘active authors’ ("China has 20.8

million bloggers," 2007). The July 2007 CNNIC report said that of the 137 million

Internet users across China 19.1% of those had blogs. The most popular are those

written by celebrities ("Chinese bloggers to reach 100 million in 2007," 2006). Most

are based on individuals and very few are based on news. At the end of 2007, CNNIC

released the findings of a survey on bloggers, which estimated 72 .82 million blogs

spaces in China, and 47 million blog writers, making about one quarter of all

Mainland netizens (CNNIC, 2007). In 2007 the website 163.com, and its search

engine youdao.com, looked at data from millions of blog entries and concluded that

the most popular topics on blogs in the first half of the year was Mother’s day,

followed by the television program Super Boys. Other topics in the top ten list

included April Fool’s Day, Qing Ming Festival, Dragon Boat Festival and Father’s

Day ("Hottest Topics in Chinese Blogs 2007," 2007). CNNIC’s 2007 report said that

“In terms of major content the blogs covered, 47% of the blogs are written about the

inner monologues or record of emotions of the writers. Next are the narration of daily

life, personal interests and hobbies. Most of the blogs are for the writers to record

their own life status and conduct self demonstration, with the blogs having a more and

more obvious tendency of self-media attributes” ((CNNIC), 2007). Though these

figures are not accurate, because bloggers come and go, it still gives a rough picture

of the extent of the Chinese blogosphere.

The attempts to manage blogs are the same as with other areas of the Internet, that is

through legislation the management of the code used in the creation of the

architecture of the Internet and the development of content in order to promote self-

censorship through these mechanisms. The difference here though is there has been

less direct investment by the government to develop content in this area unlike news

and the games sector. Instead, there has been the promotion of the use of blogs by

party members to promote CCP sanctioned views. Blogs have also been used as a

forum for public feedback.

Promotion tinged with fear

Sniffer Packets & Firewalls 132

Blogging has not been embraced by the government in the same way that other

sectors of the Internet have been. There has not been the same high level of

investment in blogs, nor has there has been a high level of official content

development by the CCP. This lies in stark contrast to other sectors of the Internet

such as news and the gaming sector where there has been a high level of investment

of government sponsorship. It is difficult to find information at this stage that might

shed some light on the number of CCP member blogs, and there are no official figures

on this. Blogs are seen as another avenue in which government and party officials can

communicate with citizens, however the CCP prefer the use of websites to promote

government policy. There were reports on the use of blogs by delegates and

journalists at the National Peoples Congress in March 2006, and even the suggestion

that Premier Wen Jiabao should set up a blog (Qing, 2006, n.p.). There are also

reports of government sponsored Internet commentators whose job it is to promote the

government’s views in blogs.

According to the China Daily “in Suqian, a mid-sized city in East China’s Jiangsu

Province, 81 middle and high-ranking officials in the municipal government have

opened blogs on the government website (http://blog.suqian.gov.cn/)” (S. Wang,

2007, n.p.). The China Daily said the highest-ranking official to write a blog is Zhao

Qizheng, former director of the State Council Information Office, who at the time of

writing was the President of the Journalism School of Renmin University in Beijing.

In August 2007 he launched his blog "Zhao Qizheng and his books" where he has

uploaded several chapters of his latest work ‘In the One World – 101’ (sic) Tips on

How to Communicate with Foreigners’ (S. Wang, 2007, n.p.).

The reports in the government press on blogs and stories that are linked to blogs are

often used to promote a party line or policy such as the story ‘Govt bloggers followers

only a clique away’ in the China Daily in August 2007. The story outlines some of the

uses government officials have put their blogs to and promotes these blogs as a way

for officials to get in touch with the public, a forum for public feedback and this

practice is viewed as a form of democracy by the CCP. The article quoted Xie

Chuntao, professor at the Party School of the Central Committee of the Communist

Party of China in Beijing as saying that "it is a good thing that officials opened blogs

and strengthen their communication with the ordinary citizens," (S. Wang, 2007,

Sniffer Packets & Firewalls 133

n.p.). The China Daily article features contrasting stories of public feedback on

official blogs one that sees feedback in a traditional form. A form in which is citizens

publicly pledge subordination. In another where the blog was used to promote an

issue and gather feedback. At the same time the report finished with the idea that

blogs should be secondary to the use of websites as a means of getting in touch with

the people.

Within the report was a story on the pledges of subordination that occurred in

response to the blog of Jiangsu Communist Party secretary, Zhang Xinshi, who was

said to have written on a variety of topics including climate change and education.

The report said that "Zhang hopes that those who are in charge at the different

government organs can also have blogs so that they can express their ideas, attract

people’s discussions and build an efficient channel of communication between

officials and ordinary citizens” (S. Wang, 2007, n.p.). Most of the blogs that I have

looked at have a feature for readers to post comments. The example of feedback that

the article gave on the pledge of subordination involved a posting by Zhang on

‘civilized behaviour’. This posting prompted the local Suqian Daily to run a column

about the topic, and this was followed up by more than 100,000 pupils and high

school students distributing pamphlets on civilized behaviour in the streets (S. Wang,

2007, n.p.). The China Daily lamented that “almost each of Zhang’s online articles

was read more than 400 times, but there have been few posted responses from the

public. When a comment was made, it often turned out to be a pledge of a subordinate

to implement the Party secretary’s ideas, not public feedback” (S. Wang, 2007, n.p.).

In contrast to public participation based on subordination was a story that featured

more meaningful feedback. This was feedback generated by the blog of Liao Xinbo,

deputy director of the provincial health bureau of South China’s Guangdong Province.

The report said that Liao’s is the most popular blog run by an official (S. Wang,

2007, n.p.). Liao launched his blog in April 2007 and it is the sixth most popular blog

in Guangdong Province (S. Wang, 2007). The story hailed Liao’s blog, and the way in

which he has used it to bolster and garner public opinion is hailed as an example of

democracy in action. The China Daily report says “Liao’s blog, with its inspiring

discussions, provides a prime example of a form of "direct democracy"(S. Wang,

2007).

Sniffer Packets & Firewalls 134

Liao, or as he calls himself Doctor Brother Bozi, writes on health issues and has

promoted the idea of contracts for doctors. He reminds readers that Doctors are meant

to ‘serve the people’. The China Daily report said that “Liao also argued in his blog

that health services were not a commodity that should be "bought" by patients, a key

point that health providers need to serve the public, instead of trying to rake in

money” (S. Wang, 2007, n.p.). The posting that kicked of this rather staged debate

was when Liao “posted an article by an anonymous doctor which blamed China’s

apparent failure on medical reform over the last 30 years on the lack of fair pay for

doctors”(S. Wang, 2007, n.p.).

Liao sought feedback on his blog. He said "I have never studied laws and cannot give

any comments. I wish my friends who are interested to give their ideas" (S. Wang,

2007, n.p.). People who agreed with Liao urged him to lobby his allies at the

provincial people’s congress - the legislative body - to draft a law especially for

medical contracts. There was even a drafting, by a netizens, for a medical contract law

posted on the blog. The China Daily said that “whether or not the fact the netizens’

law proposals were right or wrong, their interaction with this sort of blogging

demonstrates how ordinary people can debate the merits of such proposals” (S. Wang,

2007, n.p.).

The final part of the article seems to advocate the use of official websites as a

platform for the dissemination of information and public feedback, and features

comment from Mao Shoulong, a political scientist from the Renmin University. Mao

in 2006 said in a commentary in the Peoples Daily that "by further exploring the

communication possibilities of blogs, officials may better win the citizens’ trust if

there is successful communication between the two sides,"(S. Wang, 2007, n.p.). The

quote was reprinted in an article extolling the virtues of blogs in the China Daily in

August 2007. The report went on to quote Mao Shoulong as saying "actually, if we

want the government to get nearer to the ordinary citizens, we can make more efforts

on improving our democratic system instead of using the highly personalized blogs.

At the current stage, we can improve the government websites that widely exist, and

make them work better in publicizing policies and communicating with netizens. This

is a more constructive choice” (S. Wang, 2007, n.p.).

Sniffer Packets & Firewalls 135

What the article reveals in a limited way is the debate about the role that blogs should

play in the governments overall egovernance construction of the Internet, and gives a

glimpse of what the CCP notion of democracy could and should look like. The article

is also illustrative of the centre/margin relationship on the development of policy in

this area as they are played out in the media. The leadership of the CCP is the centre

of these relationships and local and provincial party members are placed in the

margins. In these examples it is possible to view via the reporting of the examples and

the sources of the articles an interaction between the centre and the margins. Activity

in the margins has often been used for experimentation of policy initiatives and the

Liao case may serve as an example of the role official blogs may have in serving

future government policy formation and dissemination30.

Regulations

The main feature of the regulations that relate to blogging is the promotion of self

censorship. Thus ultimate responsibility for what is posted lies with blog providers.

Bloggers are subject to the existing laws governing the Internet, as well as being

subject to attempts to further tighten management through the introduction of a code

of conduct for bloggers. The code and the pledge are vague in detail; for example item

5 says “blog service should obey Chinese laws and regulations, protect the legal rights

of blog users and the public” (MacKinnon, 2007a, n.p.). Item 10 says that “if a

blogger doesn’t adhere to the terms, the service provider has a right to delete any

illegal or bad information, or terminate the blogger’s service” (MacKinnon, 2007a,

n.p.). 31 Making BSP’s responsible for what is posted is the simplest way to block

undesirable content.

In August 2007 the "self-discipline code for blog services" was drawn up by the

Internet Society of China (ISC) ("China's main blog service providers subscribe to

self-discipline code ", 2007). The code had input from bloggers, blog providers and

lawyers, and encouraged the use of real name registration. When the pledge was

originally announced there was a call for the compulsory registration of real names of

30 Regional policy experimentation was covered in Chapter 3. For more detail see Goodman, D.S and G. Segal (1994) China Deconstructs Trade & Regionalism31 For more detail see Appendix IV

Sniffer Packets & Firewalls 136

users, but this was met with fierce opposition. The People’s Daily online said that

“real-name registration is only to be ‘encouraged’ instead of being made compulsory,

originally the intention of the government until it met with fierce opposition. Blog

service providers are required to ensure security and confidentiality of information

that bloggers prefer to keep secret, according to the code”("China's main blog service

providers subscribe to self-discipline code ", 2007). Ten major blog providers have

signed the code including MSN China, Yahoo ! China, Sina, Sohu and cn.MSN .com,

Tianya and the Peoples Daily. An Huang Chengqing, secretary general of the ISC

said "conditions are not yet mature for implementing real-name registration as we

lack reliable technology for privacy protection and identity verification,"("China's

main blog service providers subscribe to self-discipline code ", 2007).

All of this suggests that there appeared to be some level of debate over real name

registration of bloggers. The level of debate, the open reporting of the debate and

what appears to be a win for bloggers with the watered down registration program is

more suggestive of the emergence of a wider level of public discourse and a relaxing

of political authority, rather than the emergence of blogs themselves. What the

government has allowed in the way of debate has been incorporated and absorbed into

the existing management strategies for public opinion and debate.

The debate about real name registration is also evidence of centre/margin negotiations

of power, with the authorities’ demands for real name registration at the centre and

opposing bloggers at the margins. In this sense the creation of China’s blogosphere is

also the creation of a new space in which centre margin relationships can be viewed

and played out. Despite the introduction of real name registration there is still the

potential for those who are determined to remain anonymous to do so, provided they

have the technological skills, BBS however are a much more viable option for

remaining unidentified (MacKinnon, 2007b, n.p.).

A Nail House in Chongqing and the birth of Citizen Journalism

The examination of centre margin relationships highlights or reveals the tensions and

the shifts that occur as these relationships are played and are constantly negotiated

and how things change over time. Centre margin relationships are constantly in a state

of flux and blogging has facilitated the emergence of new margins to appear, but only

Sniffer Packets & Firewalls 137

because the government has allowed this. It is therefore worth looking at the ways in

which blogs have been used by marginal groups and how centre margin relationships

are negotiated within the Chinese Blogosphere.

There have been incidents that suggest that bloggers are able to challenge the

government in some ways. Ultimately though, these challenges happen because the

government has allowed it or more pointedly because it suits them to allow it. The

anti-Starbucks blogs was one such incident, as was the Tianya BBS posting by the

fathers of abducted children that seemingly kicked of the Black Kiln incident. The

Nail House in Chongqing and the reporting of the story by bloggers is an incident was

still to some extent stage managed. The reporting of the incident spilled from citizens

blogs to the mainstream media. Blogging on the subject of the Nail House and the

ensuing media coverage only occurred because the government allowed it.

A nail house (钉子户) is a privately owned home where the owner has refused to sell

out to property developers. Stories about nail houses spread across cyberspace in

March and April 2007. The most famous of these was in Chongqing in Sichuan

province where the owners of a house refused to move and their home became an

island in a ten metre pit as the development went on around them. The story of “The

most awesome nail house in Chongqing” as it became known first broke on a blog

and this sparked a wave of blog coverage to this form of protest. This led to a number

of citizens heading to the site of the nail house and using mobile phones to capture

images of its final demise, and they became known as citizen reporters or journalists.

Part of what sparked interest in the nail house was the introduction of property laws

that had been passed in mid March 2007 during the session of the National Peoples

Congress, laws that would not come into effect until October of that year.

Images of the scene littered the Internet as the debate about the house and what should

be done became more intense. On the Tianya forum the photo (Fig 6) was and the

following comment was attached to it (Goldkorn, 2007, n.p.);

At the beginning of March, a photo called "the coolest nail house in history" stirred up a lot of debate. Within the space of a few days, this photo was widely circulated and posted all over the Internet, and a lot of

Sniffer Packets & Firewalls 138

media as well as the general populace were interested in the affair. This happened at the same time as the Property Law [was being discussed at the NPC], so people were even more curious about it. The final fate of "the coolest nail house in history" will be a famous monument to the progress of the Property Law.

Figure 6 The Nail House Chongqing

The Danwei website said that “Tianya post has hundreds of comments representing

many different points of view about the Property Law, the evils of state- and

privately-owned real estate development, and the rights of tenants (Goldkorn, 2007,

n.p.). The China Daily said that “on China’s portal websites like sina, 85 percent of

those polled showed support for the couple. China passed its landmark property law

last month, highlighting the protection of private property” ("'Nail house' in

Chongqing demolished," 2007).

On March 28 a young blogger from Hunan arrived in Chongqing to cover the story

and because of his efforts he became known as the first citizen reporter in China.

Zhou Shuguang (周曙光) who blogs under the name of Zola, also became a story as

the Southern Metropolis Daily profiled the young blogger and his quest to cover the

Nail House story. John Kennedy has translated Zola’s blog entry on his initial report

Sniffer Packets & Firewalls 139

from ‘ground zero’, the site of the Nail House. Zola writes that (Kennedy, 2007b,

n.p.);

As everyone knows, some reports of news like this which involves the government will surely never be reported, and [online] stories will be deleted at the request of unknown “relevant departments”. There had been a Sina blog reporting 24 hours a day on the situation, but that blog later disappeared. That’s why I realised this is a one-time chance, and so from far, far away I came to Chongqing to conduct a thorough investigation, in an attempt to understand a variety of viewpoints…

Mainstream media picked up the incident after a local court ordered the house for

demolition at midnight on March 23. According to a post on EasSouthWestNorth the

local and national media could not update the story as quickly as the bloggers (W.

Chen, 2007, n.p.). There was live coverage on several forums and websites through

blogs including MOP, NetEase.com, KDnet, Tianya, MOP and Sina. Things heated

up on the Internet and a blogger who goes by the name of Naked Running Dog (裸奔

的狗) began broadcasting directly through his mobile phone and sent video to an

administrator at MOP (W. Chen, 2007, n.p.). On the night of the demolition MOP

Hodpodge ran to live broadcast posts, and had received 7,000 or 8,000 comments (W.

Chen, 2007, n.p.). Du Peiyuan the leader of MOP Hodgepodge said “the significance

is about the future because this is where the trend is heading” (W. Chen, 2007, n.p.) in

response to “the simultaneous appearance of so many large-scale live reports at the

various forums can be considered a milestone in the history of the development of the

Internet in China” (W. Chen, 2007, n.p.).

EastSouthWestNorth said that (W. Chen, 2007, n.p.)

Du Puiyuan’s view, the "most awesome nailhouse" was able to give birth to "citizen journalism" because it contained several major factors: the "Property Rights Law" itself (which was brought out during the recently concluded National People’s Congress); the coincidence between this "most awesome nailhouse in history" and the "Property Rights Law"; and the highly symbolic deadline (March 23 midnight) for the forced demolition all drew heavy attention within the same period of time.

Sniffer Packets & Firewalls 140

On March 29 the China Youth Daily ran an editorial criticising the Nail House and

the bloggers who supported them (Fig 7). The editorial, written by Lu Gaofeng ( 陆高

峰 ) ("China Youth Daily editorial calls for greater professionalism in Chongqing

"nail house" reports," 2007), said “some media have used (or abused) coverage of the

"nail house" in Chongqing to manufacture public sympathy for the ‘weak’ in the

pursuit of bigger audiences. In the editorial Lu argues that while officials must face

media scrutiny ‘pure-heartedly’, the media need to hold up their bargain, namely to

“preserve impartiality and cool-headedness, not gallery, not misleading the public,”

and that ‘rational analysis’ insufficient in coverage of the ‘nail house" story’ ("China

Youth Daily editorial calls for greater professionalism in Chongqing "nail house"

reports," 2007).

Figure 7. Screen Capture from China Youth Daily

A settlement was finally reached between the owner and the developer and the house

was demolished on the 2nd of April, when the owners were given an apartment of a

Sniffer Packets & Firewalls 141

similar size. The China Daily said that “experts believe that the outcry reflects a

growing dissatisfaction among common people about the way sites are

commandeered and buildings demolished”("'Nail house' in Chongqing demolished,"

2007).

The incident itself and the coverage of the story on blogs and BBSs illustrates a level

of debate about issues that government seems comfortable with. Dan Southerland of

China Brief said at the time that “the lenient treatment of Wu Ping may have helped

the government to make a propaganda point, namely that the government respects

private property, at least in certain cases. Yet, the “nail house” case may also reveal

that downtrodden individuals in China are becoming more willing to challenge the

system through unconventional means (Southerland, 2007, n.p.).However the incident

reveals once again that the ability to censor and delete postings that are deemed in

appropriate means that the government is still able to silence debate if they have the

will to do so.

On March 24 the Information Office of the State Council released a notice that said

there was to be “no more reporting and commenting on the "nailhouse" event. All

news related to this event must be pushed to the backend. All special feature pages are

deleted. All comments function on this news are closed”("Chinese Government

Forbids Media Reporting of The "Nailhouse" Story," 2007) . Some Internet portals

such as Sina, Sohu, Netease and QQ had deleted all their special reports 15 minutes

after the notice went out. Blogs were not completely exempt. There are some reports

that some blogs had been deleted, though those established on Sina on the 22nd of

March had remained. The blog had attracted 156,393 visitors and 16,534 comments

had been posted, though by the 24th the comments page was locked and the comments

could not be read("Chinese Government Forbids Media Reporting of The "Nailhouse"

Story," 2007) .

Zola’s success in his coverage of the nailhouse made him something of a celebrity in

the Chinese blogosphere and fans urged him to cover other stories. Zola is not without

his detractors and has been criticized for taking money to finance his travels to cover

other stories. He had also changed blog hosts to one outside of China because his

Sniffer Packets & Firewalls 142

Chinese blog host was subject to censorship. In March he went to Xiamen32 and

reported on an anti-chemical plant demonstration and in July he covered a pro-

democracy rally in Hong Kong.

In November 2007, at the Chinese Blogger Conference, Zola announced his intention

to bring to an end to his blogging and return to selling vegetables. His retirement was

short lived when a story about the plight of ant farmers in Shenyang in Liaoning

province hit the headlines in November. The ant farmers hit the streets in protests

when the Yilishen Tainxi Group makers of traditional herbal medicines went bankrupt

and failed to pay dividends to thousands of people who lost their life savings after

investing in the company or buying ant farming kits to produce ants for herbal

medicines and aphrodisiacs.

The story of the ant farmers follows a familiar pattern. The story was broken and was

everywhere in the media and on the Internet, it was then deemed politically sensitive

and was heavily censored and the story then disappeared from the media. The state

owned media released the official version, claiming the riots or the protestors were

caused by a few malcontents. In the ant farm scandal the state media laid the blame

for the protests on the company chairman Wang Fengyou. Xinhua said that

“thousands of ant farmers had gathered at the company offices to demand their

money, but Wang allegedly paid 46 employees 1.03 million yuan (139,000 U.S.

dollars) and company executives 160,000 yuan and 30,000 U.S. dollars to organize

protests outside government buildings instead” ("Company chairman arrested for

instigating social unrest ", 2007).

Reports on the Global Voices website suggested that bloggers were scrambling to

save video of the protests (Kennedy, 2007a, n.p.). Rebecca MacKinnon tested several

blogs and blogsites following the crackdown on the story including Tianya, and

Sohu, and found that she was unable to post information on the protests, and the word

Yilishen was being blocked on search engines (MacKinnon, 2007c, n.p.). Zola went

to report on an Ant Farm protest in Shenyang where he was detained and said to have

been beaten and made to make detailed reports on all the people that he met since his

32 The Xaimen PX plant demonstrations are covered in chapter 5.

Sniffer Packets & Firewalls 143

arrival in the city. Later he was put on a plane and sent back to Changsha at his own

cost and has been instructed not to go too far (MacKinnon, 2007c, n.p.)33.

In another incident in January 2008 Wei Wenhua, the general manager of a

construction firm, was hailed a brave ‘citizen reporter’ and a martyr by bloggers after

he was beaten to death by officials for trying to use his mobile phone to film a protest

over the dumping of rubbish (Barboza, 2008, n.p.). The mainstream media also

covered the story and an investigation was launched into Wei’s death. The incident

was seized upon by Beijing to promote the rule of law and to clarify the limits to

official’s (chengguan 城管) power. Following the incident a meeting of 100 officials

from across the country gathered in the capital to condemn those involved and to

declare that those involved had "trampled the law and violated human rights” ("Para-

police officials condemn beating death of man in Hubei," 2008). The chengguan,

short for Chinese City Management Administration and Implementation of Law (城市

管理行政执法局 ), are quasi-law enforcement officials with a wide range of

responsibilities that mainly focus on keeping illegal vendors and sellers of pirated

goods off the streets, deterring beggars and turning away distributors of commercial

leaflets. The chengguan are not popular and in 2006-2007 there were a number of

reports across the nation suggesting that many were using standover tactics in order to

force vendors into paying protection money. Radio Free Asia suggested that there

have been other incidents involving violence perpetrated by chengguan in Hunan and

Sichuan ("China: Who are the chengguan?,"). Beijing used the incident to reassert

their authority over the margins, in this case the chengguan and those directly

responsible for them, local governments. The delegation of chengguan officials in

Beijing was a staged event and a visualisation of the negotiation of centre margin

relationships, and in this instance the subordination of the margins to the centre.

Regulating Code

The blocking and banning of words and websites is the most common way that code

is used to manage the content of the Internet and this is also the case with the

blogosphere. According to Global Voices, a number of blog hosts have been blocked

33 For more detail on Zola’s arrest and her extensive testing of blog censorship following the scandal see Rebecca Mackinnon’s blog post http://rconversation.blogs.com/rconversation/2007/12/nailhouse-blogg.html

Sniffer Packets & Firewalls 144

over the years. In June 2005 it was reported by Rebecca McKinnon and Asiapundit

that all Typepad blogs were being blocked and that included access to MacKinnon’s

blog. In March 2007 Livejournal, Xanga, Blogsome, and Technocrati were also

blocked ("Access Denied Map: Mapping Web 2.0 Censorship," 2007). The examples

above also illustrate the ease with which code is used to delete and block what is

deemed undesirable in the Chinese blogosphere.

Blog hosts play an important role in the government’s strategy to manage

informational flows as this is easiest point in the architecture to filter for words that

are deemed dangerous. Blog Hosts, like all content providers, are coopted into

censoring on behalf of the government through regulation as discussed above.

Rebecca MacKinnon calls this the out sourcing of censorship (MacKinnon, 2007b,

n.p.). There are lists of banned words that are used to monitor and filter what is posted

online, and these lists are maintained by private companies. Tennecent QQ was

among the Blog Service Providers (BSP) to sign the code of conduct. In 2004 an

inventory of banned words was discovered by Chinese hackers who located the list in

a document in the installation package of QQ instant messaging software34. QQ is

owned by Tenecent and the instant messaging software is the most popular in China,

with millions of users each day. According to the China Digital Times(CDT) it is

more difficult to filter words at the server end because of the high volume of traffic. It

is for this reason that Tenecent put the filtering program into the installation package.

When the software is installed on a computer, a program file called COMToolKit.ddl

is automatically included, and this is the file that contains the list of words that can be

automatically blocked (Qiang, 2004, n.p.).

CDT ran the story and carries a detailed description of the list. The story it was noted that (Qiang, 2004, n.p.),

Recently, some Chinese hackers located this file and released it on the Internet. The censored key words list is commonly used not just for QQ, but also for all websites, BBS and text messaging services. One Internetuser did a rough breakdown of the list: About 15 percent of the words are sex related, the rest are all related to politics. About 20 percent of the words are Falungong related, including “师父” (master) and “弟子”

34 For more details on the list see Appendix IV

Sniffer Packets & Firewalls 145

(disciple); about 15 percent are names of current officials and their relatives; about 10 percent are words used in the liberal political discourse such as “democracy”, “freedom”, and “dictatorship”; and about 5 percent are related to certain nationalistic issues, such as ”保钓” (defend Diaoyu Island), “俄国边界” (Sino-Russian Border) , “卖国” (selling out the country) etc. About 15 percent of the forbidden words are related to anti-corruption, such as “走私” (smuggling), “公款” (public funds); etc. Other censored words include names of dissidents,writers, and intellectuals, and names of certain foreign publications.

Microsoft

It seems that, as many stories that appear suggesting that the Internet in China is

becoming freer, just as many stories appear about crackdowns and the extent to which

Chinese authorities are trying to ‘control’ the flow of information. In January 2006 it

emerged that Microsoft had blocked Zhao Jing’s (Michael Anti) blog because he

criticized the government for firing editors at a progressive Beijing newspaper (K.

Chen & Fowler, 2006, n.p.). The Wall Street Journal said at the time that “efforts to

access the site from inside and outside China trigger a notice that "the space is

temporarily unavailable” (K. Chen & Fowler, 2006, n.p.).

Waggener Edstrom from one of Microsoft’s public relations agencies said that blog

“has been blocked to help ensure the service complies with local laws in China”(Kirk,

2006, n.p.). This line was again reiterated by Microsoft Chief Executive Officer

Steve Ballmer when he said, “we have an obligation in all the countries where we do

business to abide by the laws and the government decrees in those countries," Ballmer

said. "We do here, we do in Europe; we also do in places like China. And anybody

can choose not to do business in any country. We all have that option” (Kirk, 2006,

n.p.).

Several Internet companies including Yahoo and Google have used the line of

observing local law to justify their decisions, and have received harsh criticism in the

West for doing so. Yahoo handed over information to the government which led

directly to the arrest and ten year imprisonment of Shi Tao, a journalist who was

“convicted for divulging state secrets to foreigners after passing along an e-mail that

contained a warning from the Chinese government urging its officials to watch out for

dissident activity ahead of the 15th anniversary of the Tiananmen Square massacre”

(Kirk, 2006, n.p.). Google has also come into criticism for running a censored version

Sniffer Packets & Firewalls 146

of its search engine which filters out information that the government does not want

its citizens to see.

Microsoft later changed its policy following a public backlash to the blocking of blogs

in China. In a statement made by Microsoft senior vice president and general counsel

Brad Smith, it said that “Microsoft will remove access to content only in the country

issuing the order. When blog content is blocked due to restrictions based on local

laws, the rest of the world will continue to have access” ("Microsoft revises policy on

shutting blogs after China backlash ", 2006). Compliance with local laws is often the

justification used by multi-national companies when they are criticized for the

blocking of information or as in the case of Yahoo for giving the names of people

who post sensitive information.

The reporting and blocking of Zhao Jing’s blog and the position and subsequent back

down by Microsoft visualise the negotiation between centres and margins. In this

instance the CCP and the Beijing Government acts as a centre of power and authority

and Zhao Jing acts at the margins. There is also negotiation between Beijing as a

centre and Microsoft at the margins, as well as foreign relations as centre/margin

relationships being played out between the United States of America which held an

inquiry into the behaviour of Microsoft and their dealings with China and Beijing.

The inquiry into Internet company behaviour in China is like a staged event to

highlight opposition to China’s position on freedom of speech and human rights.

The East West relationship is further played by Western NGOs that seek to help

political activists in authoritarian countries such as China circumvent the

government’s system of censorship. Reporters without Borders for example, have

published an online handbook that offers information to bloggers who want to defend

themselves from recrimination and censors. The guide was partly funded by the

French government and gives people tips on how to set up and publicise a blog, and

how to establish credibility. ("Blog censorship handbook released," 2007). However,

there is no doubting that the government’s systems of censorship have been very

effective at filtering out discussion of what they do not want posted for a mass

Internet audience. The editor of the US-based China Digital Times Xiao Qiang, said

Sniffer Packets & Firewalls 147

that “censorship’s most direct impact on blogging is that there is a lack of ‘political

bloggers’ in the Chinese blogosphere. Pure politics is simply too dangerous. The

small numbers of campaigning bloggers are not dissidents; they do not call for the

overthrow of the Communist Party. But they are at the forefront of debate on specific

social issues” ("China trembles at the power of the blog," 2007). Isaac Mao also

argues that explicit political activism is not possible. Mao says “The priority now is to

help people help themselves constructively through technical means, not political

means. (Obvious reason: overt political activism is not feasible” ("I Still Believe

Some Day I'll Change The World In My Way," 2007, n.p.). That is to help individual

citizens find ways around the censorship of the Internet in China and for people to

educate themselves and to learn to communicate freely.

Examination of East West conflict as it is mediated in incidents involving the

circumvention of traditional informational flows does divert attention from what is

going on in other sectors of China’s blogosphere. The examination of these points of

resistance, conflict and negotiation do however reveal the tensions that are inherent in

spatial and temporal relationships and the way in which information is managed in

response to these things. Saptial relationships in this instance include those between

Beijing at the centre and local and provincial governements at the margins, and

Beijing's relations with the west. By temporal relationships I mean competing

versions of events. It is the charting of centre/margin relationship both within China

through the exploration of what can and cannot be said. It illustrates how the

boundaries of debate are often in a state of flux and renegotiation. Examination of

these points of resistance also demonstrate how the boundaries of debate are subject

to temporal issues, such as the use of history to serve the needs of the present as is the

case with the anti-Japanese rhetoric that is allowed to flourish at different times and is

held back at others. Temporal cycles can be found in Chinese politics as certain dates

approach, such as the crackdowns that coincide with June 4, October 1 National Day

and the 17th Party Congress or the opening of the National Peoples Congress session.

Public debates and the limits to what can and cannot be said are managed in

accordance of these dates and the significance given to them by the CCP and the

opportunities that marginal groups may see in the terms of being able to protest. At

the same time the examination of the conflict or incidents of circumvention of CCP

political discourse also reveals tensions in spatial centre margin relationship that

China has with the west and specifically the USA. In this sense the USA as the worlds

Sniffer Packets & Firewalls 148

remaining super power is the centre and Beijing as and emerging superpower is at the

margins. Examination of these points of resistance exposes the assumptions inherent

in the reporting of these events and the way in which world news is also a way of

talking to a global audience.

Points of resistance are not always overtly political. The Nail House in Chongqing

and the actions of the bloggers was provocative and obviously linked to the property

law, it was not however overtly political in the sense that people were looking to

overthrow the government. It is these kinds of incidents and people’s uses of the

Internet, blogs and bulletin boards that reveal the limits to the strategies employed by

the CCP for the management of informational flows and the extent to which those

boundaries are resisted. Thus looking at these kinds of incidents is useful for the

charting of centre/margin relationships. These include those relationships that have

traditionally existed such as those between the CCP and Beijing at the centre and the

provinces at the margins. Blogs also create a new space in which other marginal

groups may emerge and interact with the CCP and Beijing at the centre. The ways in

which these kinds of incidents are reported in the Western press allow a visualisation

of the relationship between Beijing and the West.

There is evidence of social change and that China is on many levels moving toward a

more open society even though there are many subjects that are still taboo and blogs

and the Internet are facilitating that process of openness to some extent, though major

BBS and online forums may be more influential ("Chinese Bloggers, Podcasters and

Webcasters," 2005). As Rebecca MacKinnon says “if one combines the growing

online space for private civic discourse provided by blogs with a functionally

effective system of censorship and filtering, the result appears to be a recipe for

gradual, slow evolution—not democratic revolution” (MacKinnon, 2007b, n.p.).

MacKinnon also makes the important point that over focusing on the points of

conflict misses many of the other things that are going on in China’s blogosphere;

outside observers of Internet and politics in China would do well to focus on the impact of blogs beyond the narrow scope of overt political protest and obvious political change. Most Western media attention focuses on those instances where bloggers clash with government censors or the

Sniffer Packets & Firewalls 149

web hosting companies who act as proxies for government censors. But to look only at these instances of conflict is to miss a great deal of what is really happening, much more quietly, under the surface(MacKinnon, 2007b, n.p.).

An example of MacKinnon’s point was when Western reporters were caught out by

over focusing on censorship issue when two prominent Chinese bloggers staged a

hoax that made it appear that their blogs had been shut down, and the western

reporters assumed it was the government as did some Chinese people. The blogs

called Massage Milk and Massage Pig staged the shut done in order to make fun of

Western Journalists. Wang Xiaofeng the author of Massage Milk said (MacKinnon,

2006, n.p.),

"I just wanted to make fun of Western journalists? [content] doesn’t need to be serious on the Internet. I don’t like it that Western media take a distorted view of China, though China does have problems," Wang told Interfax in an emailed statement, "I thought that if I closed my blog, it would stir their imagination and then they would begin blah blah. It really is as expected. So let’s they have an April Fool’s day in advance."

The story also reveals the assumptions made by the western media in relation to the

way in which the Internet operates in China. Isaac Mao argues that blogs are

establishing networks of trusted information that circumvent traditional media

informational flows. He uses the example of the Nail House in Chongqing and how

people trusted Zola the blogger over traditional media. Mao says that “trusted

networks are also very fast in spreading information because people believe

information coming from people they trust. (Unlike government controlled media

which is generally not so trusted.) Though there are cracks in the Great Firewall it is

still well maintained through legislation, the development of content and through the

architecture.

Conclusion

The strategies used to manage the Chinese blogosphere are the same as other areas of

the Internet, that is through the development of content, legislation and the code used

to construct the architecture of the Internet. Content in this sense comes via Blogs and

this has been hailed as the birth of citizen’s journalism, and the Zola case is

interesting for a number of reasons. Firstly when he was allowed to report on

Sniffer Packets & Firewalls 150

incidents that were used by the CCP to promote an issue of there interest. This was

the case during the nail house in Sichuan. However when he was reporting on stories

that the CCP wanted to suppress he was silenced. It is worth noting once again that

Zola and his coverage of the nail house was used by the central government in Beijing

to reinforce its central position over provincial governments at the margins.

Exploration of the management of the Chinese blogosphere has also enabled me to

look at centre margin relations between the government at the centre and bloggers at

the margins.

Sniffer Packets & Firewalls 151

C h a p t e r 9

Lei Feng Lives on in Cyberspace

Walk into any Internet café in China and you will most likely find that it is full of

young people playing online games. Indeed, every time I went to the large Internet

café on top floor of the Wangfujing Bookstore, during my field work in 2002, the

place was full of teenagers playing online games. “China is the fourth largest online

games market in the world (U.S. is No.1) and the third largest in Asia following South

Korea and Japan. (Taiwan is fourth)” (Jenkins, 2006, n.p.). The state media cited a

survey in September 2007 that found the vast majority of Chinese school children

stayed home during school holidays and played online games and surfed the Internet

("Most Chinese kids spend vacation online," 2007). The update 21st Statistical Survey

Report on the Internet said that there were 210 million Internet users and of these

59.3% are playing online games, and the average monthly expenditure for online

games is 84 Yuan ((CNNIC), 2007, 2008). An industry survey in 2007 revealed that

the number of online gamers was 40.1 million ("Industry survey: China's online

gaming population exceeds 40 mln," 2008).

The industry in China is huge, it was estimated to be worth 1.04 billion USD at the

end of 2006 and is expected to have enormous growth potential in the next three years

("China's online game industry on a roll," 2007). Massively Multiplayer Online Game

(MMOG) and Massively Multiplayer Online Role-Playing Games (MMORPGs) are

the most common. These kinds of games enable thousands of people to play at the

same time. The government has sought to manage the industry and is shaping content

in the same way that it has other areas of the Internet. That is through government

promotion, direct investment; regulations and the shaping of content through the code

used to construct content, and this is overshadowed by the dialectic of desire and

control. That is the desire for the technology for its economic benefits and the

perceived need to control the technology for political purposes. This chapter explores

the ways in which the government has sought to manage this sector of the Internet in

their bid to create a virtual Chinese world and the tensions that have arisen in the

management of informational flows and ideas within the virtual space of online

games. Centre/margin relationships are played out in this space via the development

Sniffer Packets & Firewalls 152

of games. Fore example there is a heavy emphasis on nationalism within the gaming

sphere of the Internet and this also applies to China. In fact the Chinese government’s

heavy investment in this area has lead to the creation of games with nationalistic

themes. Nationalist sentiments are also evident from gamers themselves. The

development of content in this way ensures that the CCP retains dominant voice in

Chinese cyberspace thus reinforcing the monopoly of knowledge used to manage time

and space via communications technologies. Centre/margin relations are explored

here as they are played out between gamers and the government, as well as gamers

and gamer owners and gamers in China and the west.

The CCP’s relationship with the game sector is the same as it is with other sectors of

the Internet, in that it is underscored by the dichotomy of desire and control. The CCP

desires and promotes the gaming sector for its economic benefits and at the same time

it is demonized for harming China’s youth. There is major concern about gaming

addiction rather than about challenge to the political authority of the CCP which

underlies the government’s broader fears about the Internet and its other forms of

informational flows. The gaming sector is at times portrayed as a threat to a

‘harmonious society’ as is currently articulated by Hu Jintao. Henry Jenkins argues

that “the Chinese government has both sought to regulate game-playing and to

promote the use of computer games for cultural education -- in a sense seeing the

growth of gaming in their country as both a social problem and a pedagogical

opportunity” (Jenkins, 2006, n.p.).

Below is a screen capture (fig 7) from the official news outlet China.org.cn that

clearly shows this dichotomy in relation to Internet café which are closely tied to the

gaming sector as this is the place that many gamers have access. According to The

21st Statistical Survey Report on the Internet 33.3% of Internet users access the

Internet in Internet café ((CNNIC), 2008). The story is about an ongoing crackdown

on illegal Internet café. Note in the related headlines section on the left the first

headline says ‘Gov’t to Promote Internet Café Business’, followed by a headline that

says ‘Long-term Mechanism to Watch over Internet Café’, and the next says ‘China

Closes 16,00 Internet Cafés’ and ‘China Shuts Down 8,600 Illegal Internet Cafés’.

Sniffer Packets & Firewalls 153

Figure 8 Screen Shot China.org.cn

("Internet Cafes in Beijing Under Scrutiny," 2006)

The next screen capture (fig 8) from the same website also gives a good visualisation

of the dichotomy, and again it is the linking of related stories that best illustrate the

contradiction. The headlines ‘Online Games Set Time Limits Against Addiction’,

‘Internet Games May be Wrongly blamed’, ‘Tougher Measures to Regulate Games’,

‘15 Online Games Recommended for Minors’, ‘Unhealthy Online Games Targeted’,

‘E-Game Industry Soars in China’, show the inconsistent way in which news of the

industry and how it is perceived.

Sniffer Packets & Firewalls 154

Figure 9 Screen Shot China.org.cn

("Online Game Industry Enjoys Galloping Development," 2006)

Though the dichotomy appears as desire and control it is not necessarily the view of

the CCP. By this I mean the CCP knows that these things cannot be controlled they

can only be managed; it is a kind of balancing act between what are seemingly

competing interests. The negative consequences that are of concern to Chinese

authorities in relation to online games include the physiological and psychological

health of the nation’s youth. As with many other countries there is concern about the

pornography and violence. The dichotomy of desire and control appears in the

western and Chinese media, where it is often cast as a glittering market and a space

that is corrupting and dangerous. The way in which the games industry is dealt with

by the media is much the same as it is with the Internet in general. It is managed

within the confines of the dichotomy cast in terms of something to be desired because

it brings economic growth and something to be feared as it may in some way

challenge notions of a ‘harmonious society’. Jenkins (2002, n.p.) argues that:

…most Western discussions of the Internet and China describe the rise of digital access and consumer culture as liberating forces that cultivate democratic aspirations behind the repressive government’s back. MIT professor Jing Wang notes, however, that the expansion of consumerism has been actively promoted by the government throughout the last decade.

Sniffer Packets & Firewalls 155

Embracing a rhetoric of "one nation, two systems," the state has encouraged a shorter work week, recreational activities, entrepreneurship, and more material goods per citizen. The goal has been to facilitate economic and technological change without promoting political destabilization.

The government is well aware of this dichotomy and has used the strategies that they

have employed elsewhere on the Internet to shape virtual game worlds with Chinese

characteristics and to address what are perceived to be the negative consequences of

online gaming. Games, like other areas of content, are also seen as a tool that can be

used to promote certain values seen as consistent with the CCP’s view of a

‘harmonious society’. It is a space that can propagandise the party line and promote

their interests, and values and content is made to promote that line. The strategies

include the shaping and development of content through investment, regulation and

the code used to construct games.

Regulations

Gaming regulations have mainly been aimed at curbing game addiction. There are

three main areas, name registration for online gamers, time limits on some games to

prevent over use, and a rating system for games. To some extent the rules governing

Internet café have been aimed at young gamers. The government’s rationale for the

regulation of online games has been mainly aimed at the prevention of addiction,

corruption and health issues. According to an official statement made in 2005 games

that “break the constitution, threaten national unity, sovereignty and territorial

integrity will be banned. Anything which threatens state security, damaging the

nation’s glory, disturbing social order and infringing on other’s legitimate rights will

also be banned” (Jenkins, 2006, n.p.).

In October 2006 it was announced that games would get a suitability rating so as to

“shield teenagers from online violence, pornography and terror, despite heavy

resistance from game producers”("Computer Games to Get Suitability Ratings,"

2006). The initial Green Game Assessment Meeting organized by the China Youth

Association for Network Development (CYAND), a government-sponsored civil

organization whose aim is to promote good online behavior, rated six of the most

popular computer games ("Computer Games to Get Suitability Ratings," 2006). At the

Sniffer Packets & Firewalls 156

meeting they established the ‘green game criteria’ the rating that applied to games

suitable for players under the age of 18 ("Computer Games to Get Suitability

Ratings," 2006). The rating system at this stage is not legally binding.

In January 2007 President Hu Jintao ordered officials to “build a ‘healthy online

culture’ and to protect the government’s stability” (Powell, 2007, n.p.). Hu was

quoted in state media in April as urging Communist Party leaders to “curb the spread

of decadent and backward ideological and cultural material online” ("China to help

clean up the Internet," 2007). This was followed by a campaign in April 2007 that

sought to clean up the Internet and targeted pornography and violence. In July that

year it was announced that time limits on online games were to be introduced by the

General Administration of Press and Publication. China.org.cn said “the General

Administration of Press and Publication has decided to develop an anti-indulgence

system to control the unhealthy gaming habits of adolescents”(R. Zhang, 2007, n.p.).

The time limits are aimed directly at underage players and they must substantiate their

age when they log onto a game by using an official form of identification. After three

hours of continuous play an under age player will only receive fifty percent of the

points and upgrades earned after that time in a single day. “After five hours the player

receives no points or upgrades” ("Computer Games to Get Suitability Ratings," 2006).

Gamers tried to get around the time limit by opening up multiple accounts, but this

was thwarted by the introduction of real name identification and official forms of

identification. In June 2006 the General Administration of Press and Publications

announced that gamers would have to register their real names and provide

identification numbers to play Internet games ("Gamers to Register Real IDs," 2006).

Though technically there seems to be no real reason why real name registration was

not introduced for Bloggers it may well be that it was easier politically to impose this

on gamers as this sector of Internet users are children or teenagers and it had wide

support from parents. It is also further evidence that the government has the power to

impose restrictions on the Internet to some degree if they have the will to do so.

According to China.org.cn the introduction of time limits on games was seen as not

going far enough by some parents. China.org.cn said that “some parents suggested to

China.org.cn.cn that the real move should be to strengthen government departments’

scrutiny and administration on Internet café; otherwise, the so-called ‘anti-indulgence

Sniffer Packets & Firewalls 157

system’ is not useful ("Computer Games to Get Suitability Ratings," 2006). The

development of content is to some extent shaped by code because this is what is used

to build and regulate behaviour and this in turn helps to shape content by defining

who users are, and what they are allowed to do.

Direct Investment & the Shaping of Content

Laurence Lessig argues that code is law and that online games such as MMOGs

represents a space that is regulated through code, as outlined in chapter 4. By this

Lessig means the architecture that is used to construct the virtual world of the game is

used to regulate the behaviour of gamers. He writes that “in MMOG space regulation

comes through code. Important rules are imposed, not through social sanctions, and

not by a state but by the very architecture of the particular space. A rule is defined,

not through a statute, but through the code that governs that space” (Lessig, 2006,

p.26). Lessig is not suggesting that the construction of MMOG space through code is

not subject to human agency, what he is suggesting is that it is important to look at

who writes the code and for whom, as a way of better understanding the means by

which the Internet and online games are regulated.

In the case of China most of the code writers are indirectly working for the

government as they are one of the biggest investors in this industry, and has such the

government has had a big hand in the shaping and development of online game

content. The government has heavily promoted and invested in the online games

industry. In 2003 online game technology was listed on the ‘863’ High-Tech Program

("Nation Promotes Home-made Online Game Business ", 2003), and in June 2004 the

State Administration of Press and Publication launched the National Online Game

Publishing Project to develop 100 online games by 2009 ("China to Develop Online

Games ", 2004) . The government has also set up four online game industry bases in

Beijing, Shanghai, Guangdong and Sichuan ("China's online game industry enjoys

galloping development," 2006).

The promotion and investment in the online games market has two main themes,

economic development and the promotion of Chinese history and culture. Many of the

Chinese based news stories that I have looked at as research for this chapter involved

these two themes. Most stories that relate to investment and government promotion of

Sniffer Packets & Firewalls 158

the industry talk about the size and potential growth of this sector of the economy and

then would add that the games developed in these programs would or should feature

Chinese history and culture. In 2004 a report on the official news portal

China.org.cn.cn35 said that:

The Chinese Internet games will have to feature Chinese culture, insiders

say. In another word, Chinese game developers should consider seriously

how to blend Chinese culture with homebred games.

Developers should make more efforts in turning China’s both traditional

and modern cultural resources into digital products and form an advantage

in Internet games, they suggest”("Millions of Chinese to Become Internet

Game Players in 2004 ", 2004).

China.org.cn.cn further outlined the justification of the government’s position in

relation to gaming and their objectives for the industry saying:

Chinese online game players will begin to meet new images other than the invariably blond figures. By the end of this year, 30 large-scale online games based on traditional Chinese legends will be issued to break the foreign monopoly in the online gaming market.

Shi Zongyuan, director of the State Administration of Press and Publication, said Tuesday that “the administration encouraged the making of large-scale online games and flash works based on China’s traditional culture, noting it would help the youngsters to gain deeper understanding of Chinese heritage” ("Made-in-China Online Games Available ", 2004).

In 2006 this line was still heavily promoted by Kou Xiaowei, Vice-Director of

GAPP’s A/V, Electronics, and Internet Administration Department, who said at the

2006 Online Gaming Conference in Chengdu that “the Asian market is very similar to

the Chinese market and is therefore ripe for the introduction of new products. In

addition, China has 5000 years of culture and history with a powerful appeal. In the

West traditional Chinese culture appears more and more in foreign gaming products

35 China.org.cn is run by the State Council, headed by the Premier Wen Jiabao and is highest executive organ of state power.

Sniffer Packets & Firewalls 159

in the pursuit of the international market which also illustrates the charm of the

Chinese Market” (Kao, 2006).

In 2005 the Ministry of Culture collected what they called “homemade and healthy

online games for minors, to guide them to play with healthy entertainment

products”("Ministry of Culture Solicits Online Games for Minors," 2007). The

government;s position was summed up by Xu Jian, a professor of law and a senior

official with China Research Institute of Juvenile Delinquency, who said that the

“Internet has become an important part of modern society and serves as a good

instrument. It is imperative to standardize the web-related business, including online

games, rather than banning it”("Ministry of Culture Solicits Online Games for

Minors," 2007).

The shaping of game content is governed by the concerns of the government and their

main concern with gaming is the impact that it has on young people, the disruption

that it can have on schooling and in particular, what has been described as Internet

addiction. This is not just a concern for China, many countries are concerned about

the impact that Internet addiction has on young people, and specifically young men,

and this is used as the justification for the management of the gaming industry. The

breakdown of traditional life and its consequences are blamed on the addiction as

much as the technology itself in China. This was the case in 2002 when two teenage

boys were refused entry to an Internet café and later returned to deliberately set the

place on fire, resulting in the deaths of 24 people and the injury of 13 others. News of

the fire set off discussions on BBS and Chatrooms about the incident. When the boys

responsible for the fire were arrested the, People’s Daily reported that the main

concern was about social stability. The article said:

As soon as news of the arrest broke, China’s Internet chat rooms---one of

the freest public forums for discussions available to Chinese people---

erupted with shock, anger and concern about social stability. ‘This is not

an issue of Internet bars. It’s a problem in the education of our youth,’

said one writer. “These two boys were going to school. How can the

school allow them to have haircuts like that? ... Did the teachers and

Sniffer Packets & Firewalls 160

principal bother to pay attention to them?” one participant asked ("Arrest

of Alleged Child Arsonists for Internet Cafe Fire Shocks China ", 2002).

The incident was used to unify the nation behind the CCP’s concerns about social

stability. This is in part done through stressing traditional Chinese values of filial

duty, and the importance of education, in a bid to demonise the technology and

Internet addiction. Code is the means by which the values deemed important by the

CCP are imbedded in the games. Code is also the means by which some of the

regulations are enforced, such as time outs and real name registration. The stressing of

traditional values is a theme taken up in the development and shaping of content. The

use of code to shape and develop online game worlds that are consistent with the

values of filial duty and the importance of education are then imbedded in the games

themselves and these are to a large extent directed by the CCP.

Propaganda

Though the government promotes the idea of Chinese culture and history as the main

focus of game development there have been other themes that have more obvious

propaganda features. Currently there are several games available that have obvious

propaganda characteristics; they are Incorruptible Warrior 清廉战士 and Learn from

Lei Feng 向雷锋同志学. A third game is being developed called Chinese Heroes

which will feature historical figures such as Lei Feng, and Zheng Chengong, a general

also known as Koxinga who seized Taiwan from Dutch colonial rule in 1661 ("China

heroes mark time before foreign Web game assault," 2006). These propaganda games

directly address government concerns and priorities. Both games seek to use the past

to serve the present, especially in the case of the Lei Feng game, and all feature strong

nationalistic themes. Kou Xiaowei, an official with China’s General Administration of

Press and Publication (GAPP), the main sponsor of the Chinese Heroes games, said

“we hope the game will teach players about Chinese ethics” ("Chinese Heroes vs.

World of Warcraft ", 2006).

Games often use the past and the present, for example Incorruptible Warrior allow

players to battle corrupt officials and their bikini-clad mistresses in a virtual world

with real world name places from Ningbo. Gamers are lead by characters from

Sniffer Packets & Firewalls 161

China’s history and legends, including the first emperor Kangxi who ruled from 1661-

1772. In order to win the game players are required to learn government anti-

corruption measures and to kill corrupt officials while avoiding attacks by their

henchmen and their mistresses. The game was released on July 25 2007 and

reportedly attracted over 10,000 players by beginning of August ("Anti-corruption

game shut down after less than a month," 2007). It was so successful that the game

was shut down a month after its launch, by East China’s Ningbo Haishu District

Discipline Commission, so that it could be updated to accommodate more players as

the original version could only accommodate 600 players ("Anti-corruption game shut

down after less than a month," 2007).

Incorruptible Warrior mixes the past and the present by creating a contemporary

virtual world that addresses contemporary concerns but a world in which players are

guided by characters from Chinese history and legends. There are other games that

use the past to serve the present, such as Learn from Lei Feng and the popular

Fantasy Journey West. All of these games draw on historical figures as the characters

of the games. The object of the online game called Learn from Lei Feng is to do

enough good deeds to obtain Chairman Mao’s autograph, and the past is used to

promote values that are personified by Lei Feng. The mythical figure Lei Feng is an

iconic figure signifying altruism, and selflessness. The first ‘Learn from Comrade Lei

Feng’ campaign was launched by Mao in 1963, and he is still held up as the model

Chinese citizen. The story goes that at 20 he joined the People’s Liberation Army and

spent all his spare time and money helping the needy. Following his death at the age

of 22 his diary was published. Though his story has not been historically verified his

life is commemorated every year on March 5.

The Learn from Lei Feng game in this context is a remote and interactive Lei Feng

campaign, which uses features commonly found on other games, such as treasure

hunts and users must complete a number of tasks before moving to the next level, and

there is little violence. Learn from Lei Feng, like the campaigns that have borne his

name in the real world, is based on the themes of hard work, leading a simple life and

showing a willingness to help others ("Lei Feng becomes online game hero," 2006).

To earn points a player must darn socks, volunteer on building sites and fight some

enemy agents. When your health gets low you go and talk to the party secretary to be

Sniffer Packets & Firewalls 162

revived. As the game progresses your clothes become plainer and the treasure hunt is

for a copy of Chairman Mao’s collected works. This is more evidence of the way in

which temporal and cultural concerns are used to address contemporary issues.

Nationalism

There are more overt forms of nationalism in Chinese computer games. A most

notable example is a game called Anti-Japan War Online, which was developed with

the Communist Youth League (CCLY). The game uses the past to serve the interest of

the present in the same way that Incorruptible Warrior and Learn from Lei Feng do.

Xinhua reported “the game will allow players, especially younger players, to learn

from history. They will get a patriotic feeling when fighting invaders to safeguard

their motherland” (""Anti-Japan War Online" game to hit the market," 2005).

According to Xinhua, CCLY said in a statement “that few games on the Chinese

market today generate a "national spirit" that can educate young players. As a result,

the CCYL will actively partner with online gaming companies to jointly develop

"patriotic" online games. “Anti-Japan War Online’ is a patriotic online game that is

both interesting and instructive, and can attract and guide young players” (""Anti-

Japan War Online" game to hit the market," 2005). The CCYL is also developing

other online games with similar historical and nationalistic themes, these include titles

such as Sim Battle: Long March, Sim Battle: Blue Helmet China and Sim Battle: Sky

Dragon (""Anti-Japan War Online" game to hit the market," 2005).

China is not the only country to engage in this kind of development. The United

States Army has developed an online game called America’s Army, and claims to use

state of the art training simulation technology as part of the game. The game first

launched in 2002 and owned by the United States government can be accessed from

some official Defence Department websites. America’s Army is used for ‘public

relations’ purposes, and is a part of the army’s recruitment strategies. According to

the games website ("America's Army Game," 2007):

America’s Army provides civilians with an inside perspective and a virtual role in today’s premier land force: the U.S. Army. The game is designed to provide an accurate portrayal of Soldier experiences. The game is an entertaining way for young adults to be educated about the U.S. Army and see some of the career opportunities available to Soldiers in the U.S. Army — all this as a virtual Soldier. America’s Army emphasizes teamwork, values and responsibility as means to achieving the goals.

Sniffer Packets & Firewalls 163

Propaganda in this form is directed from a single central point and can be accessed

remotely from multiple locations. It is private and public at the same time. Public

because the Internet is a public space as are MMORG’s and private because it can be

accessed from private locales. Accessing MMORG’s from Internet café is access and

participation in a public space. Propaganda directed from a single point in the form of

online games helps to reinforce Beijing’s position as the central source of authority

and directing its view to the margins who in this case are the gamers themselves.

Online Protests and Nationalism Online games are sites in which nationalist sentiments are often expressed by gamers

themselves36. In recent years there have been a number of online protests involving

gamers in China. Generally protests involve in-game issues. An example of this

amongst Chinese gamers was a “mass suicide” protest in the World of Warcraft

(WoW) against the government’s decision to introduce fatigue shutdowns (Jenkins,

2006, n.p.).

Fantasy Journey West 梦幻西游 (FJW) was launched in 2004, and according to

Netease’s website at its peak there have been more than 180,000 concurrent users

("Fantasy Westward Journey,"). On July 4 in 2006 an incident occurred in the game

that sparked one of the world’s largest online protests. A player’s avatar in the game

was locked up in a virtual prison and the guild that he founded was dissolved. The

player’s avatar was called ‘Kill the Japs’ (干死 4 小日本) and his guild- with 700

members one of the top 5 in the game, was called ‘The Alliance To Resist Japan’ (抗

日同盟会). The prison is called ‘The Great Tang Permanent Incarceration Prison’ (大

唐永禁). In a statement Netease ("Freedom of Identity, Speech and Assembly on the

Internet," 2007) said:

Although the names of individuals, guilds, stalls, shops, pets and beasts may be chosen as you wish, Netease is running a healthy and green game. In order to maintain the purity and harmony in the game world, Netease will not permit any names that include (but this list is not restricted solely to) those that attack, insult or mislead with respect to

36 See the work TL Taylor on WOW in which she argues that guilds on the European English Server have formed around national identities (T. L. Taylor, 2006).

Sniffer Packets & Firewalls 164

race, nationality, national politics, national leaders, obscenity, vulgarity, libel, threat, religions and religious figures.

If found and verified, the following penalties may be imposed:

Warning;Loss of speech rights;Change of name;Forced offline;Temporary quarantine;Permanent quarantine;Dissolution of guild.

Netease offered further explanation and defence of their decision with the following statement:

In changing the name of an individual player or handling the case of an individual guild, we do not want to cause any unhappiness to people. We do not want such an incident to affect the patriotism of everybody. But this is a game. When we operate this game, we follow the state’s regulations on Internet administration and we are monitored by the National Internet Supervisory Bureau. People come here to experience joy, and we therefore emphasize health, relaxation and happiness and we should not bring in politically sensitive topics. The experience of history tells us that patriotism should be expressed rationally under the grand theme of protecting the interests of the nation and the people. Patriotism requires passion, but it requires rationality even more so. Passion and rationality form our correct way of expressing our patriotism ("Freedom of Identity, Speech and Assembly on the Internet," 2007).

At the time of the of the jailing and the banning of the guild there were rumours

circulating that the game was to be sold off to Japanese interest, and that they were

making changes to the game. For example there were rumours that Chinese lion

statues, often found guarding the entrances to buildings and traditionally a symbol of

unity and the Emperor, would be turned into pigs (Jenkins, 2006, n.p.). On July 7 a

symbol on a wall in the game kicked off China’s largest protests involving around

10,000 gamers (Soong, 2006, n.p.). The symbol was in a section of the game called

the Jianye city government office and was thought by many players to have a close

resemblance to the Japanese ‘rising sun’ flag. See fig 10 below. July 7 coincides with

the date of the 1937 Marco Polo Bridge incident which is often recognised as the

beginning of the Sino-Japanese War and the war in the Pacific in World War 2. This

is a sensitive date and is commemorated by the nation each year. The protest stands in

Sniffer Packets & Firewalls 165

stark contrast to the official celebrations of the date which involved an exhibition at

the bridge. ("Citizens cherish memory of Lugouqiao Incident," 2006).

Figure 10 Screen Capture of protesters assembling on The Fantasy Journey West

(Soong, 2006, n.p.)

Avatars representing gamers from across the nation milled around an area of the game

known as the ‘Summer Palace’ to express their anger. The screen capture below

(fig11) shows the protest and the IDs of all the disgruntled gamers (Soong, 2006, n.p.)

Figure 11 Screen Capture of largest online game protest

Sniffer Packets & Firewalls 166

(Soong, 2006, n.p.)

In response to this Netease explained that the rising sun motif was based on a classic

Chinese painting, "Sunrise in the East," and was intended to reflect aspects of

traditional Chinese culture. The picture below was also posted by Netease (fig 12).

Figure 12

(Soong, 2006, n.p.)

Sniffer Packets & Firewalls 167

In Netease’s defence the company posted the following on its website:

... We appreciate everybody’s patriotism. Like everybody else, we deeply remember the Treaty of Shimonoseki, the Marco Polo Bridge incident, the Nanjing massacre, the Diaoyutai issue and so on. These solemn histories make us want to become stronger because we are all Chinese. Patriotism is a form of respect, and it is a belief. Patriotism is the soul of our people, it is the soul of our nation. But we sincerely hope that everybody’s patriotic actions are rational. We hope and we believe that everybody can make rational expressions ("Freedom of Identity, Speech and Assembly on the Internet," 2007).

Jenkins argues that “What’s striking about the protest march in FWJ and Neteases’s

response to the protest is the degree to which all involved saw issues of national

honour and patriotism as at stake in this dispute. This wasn’t a struggle over an in-

game asset: it was a struggle about how the game fit within larger debates about

Chinese nationalism and about the country’s relations to Japan” (Jenkins, 2006, n.p.).

Indeed it became another site in which the tensions between China and Japan were

played out. Centre margin relationships were played out between China and Japan and

the Central government and gamers. The extent to which anti-Japanese sentiments can

be expressed often reveal the tensions the CCP has with invoking nationalist

sentiments, its relationship to history and its use in the management of internal centre

margin relationships, those between the government and Chinese citizens and the

external spatial relationships between China and Japan. There is a point where the

internal Chinese expression of nationalistic and anti-Japanese sentiments can be

expressed before they start to do harm to China’s relationship with Japan. Japan is a

big trading partner and the source of many tourists. Xu Wu (2006) points out several

incidents where the relationship between the two countries has deteriorated due to the

expression of online nationalistic and anti-Japanese sentiments. Wu (2006, p.80)

writes that:

The growing influence of the online public opinion made Chinese government’s Japan policy decision making more complicated. In addition to politics and pride, the CCP leaders had to consider economics and stability. When these two forces collide, as it is often the case in the Sino-Japan relationship, the leaders had to make a tough decision, quickly and unequivocally. However, no opposition seemed to be both politicallycorrect and economically beneficial. In reality the Chinese leaders had to play a tricky game and double-faced political game. Publicly, the CCP

Sniffer Packets & Firewalls 168

government stood firmly behind the cyber nationalist groups. Privately, however, the leaders managed to put a leash on those increasingly unruly activists.

For the CCP it is about the management of a number of competing interests that

manifest itself as centre margin relationships, and these interactions are played out via

the Internet.

WoW with Chinese CharacteristicsThe virtual worlds of gamers are spaces in which national communities are articulated

and imagined. Games that can be played internationally such as the MMORPG

World of Warcraft (WoW) have multiple servers around the world running games in

different languages and are an example of the negotiation of centre margin

relationships on an international level. Global and local interests are negotiated

between the company that runs WoW and the locales in which it can be accessed. It is

not the same game all over the world. For example in China the company Blizzard

that runs WoW has a local partner to run the game. The game and its adaptation to the

Mainland market have been fraught with tensions. Examination of these tensions

reveals the negotiation of centre margin relationships that take place within real space.

Specifically this relates to the management of the flow of information and the

articulation of Chinese national identity, such examinations reveals the CCP’s

negotiation with gamers and their ability to participate and create these imagined

spaces of national identity and the government’s commitment to managing that

identity, through the management of informational flows through regulation,

investment, and the way in which code is shaped to achieve the desired identity.

World of Warcraft (WoW) and other internationally played games have been modified

to suit the Chinese market. In June 2004 a censorship committee was set up to look at

the content of games more closely after a game from Sweden, Hearts of Iron, depicted

Tibet, Xinjiang and Manchuria as independent nations ("China censors online video

games," 2004). The Norwegian game Project IGI2: Covert Strike outraged officials

because of the way in which the Chinese military was characterized. The justification

for censorship was “online games with content threatening state security, damaging

the nation’s glory, disturbing social order and infringing on other’s legitimate rights

Sniffer Packets & Firewalls 169

will also be prohibited,” said Tuo Zuhai an official with the Ministry of Culture

("China censors online video games," 2004). Tou Zhuai said that “the Ministry of

Culture will import some foreign online games whose contents accord with Chinese

national conditions and bring positive effects to young people’s mentality”("China

censors online video games," 2004).

The popular MMORPG World of Warcraft has had a rocky relationship with China

and has been involved in a two of law suits. One involved the suicide of a young

gamer and the second involves the alleged theft of character fonts. The game has 8.5

million players worldwide and more than 3.5million of those are in China ("Bones,

skeletons buried in Chinese version of fantasy game," 2007). In July 2007 the WoW

game was modified to suit Chinese conditions. Skeleton characters in the Chinese

version of the game had their bones covered in flesh, and bones that signify dead

characters were changed to graves ("Bones, skeletons buried in Chinese version of

fantasy game," 2007). The changes triggered criticism from users on official WoW. In

a report from the People’s Daily Online “an employee of the public relations

department of The9, which runs WoW in China, was quoted by Guangzhou-based

Southern Metropolis Daily as saying the changes were made according to "China’s

particular situation and relevant regulations. It’s to promote a healthy and harmonious

on-line environment," the staff member said ("Bones, skeletons buried in Chinese

version of fantasy game," 2007). Figures 13 & 14 show the changes made to the WoW

game for the Chinese audience. Censorship in this case is not just aimed at developing

content that is seen as favourable by the Chinese government, it is also a way of

shaping the level of foreign content and reducing the influence of foreign producers

so as to develop the industry in China. In economic terms it is a form of

protectionism, and within the theoretical framework for this thesis it is also about the

management of time and space, that is the creation of a Chinese version of time in the

way that the virtual reality is constructed and the management of the virtual space

with Chinese characteristics.

Sniffer Packets & Firewalls 170

Figure 13 Harmonised Skeletons in the WoW

(Soong, 2007, n.p.)

Figure 14 Graves in WoW signifying the dead

Sniffer Packets & Firewalls 171

(Soong, 2007, n.p.)

World of Warcraft has also spawned virtual factories where people in China work for

up to 12 hours per day playing the game in order to collect gold in the game to sell on

to gamers in the USA for hard currency. Below is a screen shot from one of the many

websites devoted to this kind of trade.

Figure 15

("Cheap World of WarCraft Gold, Buy World of Warcraft Gold," 2007)

In March 2007 the government began to crack down on the trade of virtual money

after concerns were raised that it could be a mechanism to launder money or involve

other illicit trade. There was also speculation that the trade could complicate “the

government’s ability to control the flow of real currency, and the central bank has

issued a warning about the use of virtual money” ("China cracks down on 'virtual

money' ", 2007).

Gold farming has caused a lot of controversy within the WoW game and is at times

the source of nationalistic tensions among gamers (T. L. Taylor, 2006). T.L. Taylor

describes the suspicion with which certain characters are treated and stereotyped

Sniffer Packets & Firewalls 172

within the game based on certain characters in the game and their command of

English. Taylor writes that “the issue is not only the imagined ethnic construction of

the player harvesting in-game resources but that those who do not have a command of

English and are hunting in a particular area may be automatically assumed to be hired

worker” (T. L. Taylor, 2006, p. 332).

The outsourcing of leisure activities in this way may be viewed as a new spatial

relationships that have their origins in the management of time. In this case the time

poor and resource rich gamers in the USA and Europe are able to use contract labour

in China. This kind of interaction has produced a new form of economic relationship

that is governed to some extent by individuals, rather than large corporations. The real

money trade (RMT) is made outside of the game and is mediated by individuals in

different locales.

Conclusion

As this sector of the Internet gets larger it will become more significant as a cultural

space and like other cultural spaces in China it will remain under the management of

the CCP. As Jenkins puts it, “arguably, the Chinese government’s efforts to regulate

game playing -- and to promote games as part of the national culture -- have

transformed what might have been a mere pass-time into a more politically charged

environment” (Jenkins, 2006, n.p.). Online games and the addition of Chinese cultural

and historical content are seen as vital to the promotion of the industry in China.

Online games are the creation of another space in which the CCP view of China and

its identity can be constructed and imagined, and though this is interactive and gamers

are active in the construction of identity through participation it is still bounded by the

CCP. The content of the online games is managed through the laws and regulations

that govern this sector and the code that is used to construct the games. Innis’s work

was concerned with appraising and considering the attitude and the role of time in

economic history in regards to communications technology.

Sniffer Packets & Firewalls 173

C h a p t e r 1 0

“It was SARS that made the Chinese authorities aware of the importance of protecting the public’s right to know and the dangers and risks of a possible government cover-up. This year, the Chinese media did not hesitate to report big events like the severe winter weather in southern China, the Lhasa riot on March 14, and the derailment and collision of passenger trains in Shandong Province on April 28” ("Commentary: Quick media response reveals transparent gov't in China," 2008).

In order to understand the impact of the Internet on informational flows in China it is

necessary to look at, the ways in which various groups use the technology, including

the CCP. The above quote from an editorial in the Peoples Daily37 acknowledges the

challenge to the containment of information in light of the development of the

Internet. Information flows are managed in China so as to reinforce and preserve the

CCP’s monopoly over political power. The preservation of power in relation to the

Internet is in part maintained through the development and management of content

and this is shaped by regulation and the architecture used to construct the Internet.

Content is further shaped by limiting the number of news sources, a high level of

investment in content by the Government, and the use of media campaigns aimed at

shaping policy in particular ways. This is further supplemented by the government

through the use of government sponsored commentators who appear on BBS,

chatrooms and Blogs. The strategies employed by the CCP to manage the

consequences of the Internet have allowed the party to adapt to a changing

information environment where their traditional modes of control were no longer

viable.

The Internet and the CCP’s adaptation to its consequences cannot be studied in

isolation and must be contextualized within specific historical and political

circumstances. For example, the Open Door Policy has permeated every aspect of

Chinese life and its consequences are both social and physical. These consequences

underlie most of the changes taking place within China including the development of

the Internet, and are based on view that China must develop at all costs and driven by

37 The editorial was repeated on a number of websites including the CCTV website, the Peoples Liberation Army Daily, and on the Sina website. Xinhua also carried a similar editorial.

Sniffer Packets & Firewalls 174

an economic imperitive. Deibert (1997, p. 29) argues that “we must underscore the

“social embeddness” of technology. We must place greater emphasis on the historical

and social context in which technologies are introduced, an insight most forcefully

made by social constructivists of technology”. This is because synergistically one

informs the other through the interplay between society and modes of communication.

In order to look at the interplay between society and modes of communication I have

utilized the concepts of medium theory, particularly the works of Harold A. Innis. The

theoretical framework takes into account the interaction between the interests of those

who control the flow of knowledge and the medium through which knowledge is

disseminated. Innis (1952, p. 74) said that:

I have attempted elsewhere to develop the thesis that civilization has been dominated at different stages by various media of communication such as clay, papyrus, parchment and paper produced first from rags and then from wood. Each medium has its significance for the type of script, and in turn for the type of monopoly of knowledge which will be built and which will destroy the conditions suited to creative thought and be displaced by a new medium with its peculiar type of monopoly of knowledge.

The interplay between society and the Internet and the interplay between time and

space has been mapped out via the examples of this thesis. My final examples are the

riots and the crackdown in Tibet 2008 and the earthquake in Sichuan, two events

which have occurred since the main research for this thesis was undertaken. These

events best illustrate how well the CCP has adapted to the new media environment

and the success they have had in managing the consequences of the Internet. While it

is beyond the scope of this conclusion to analyze these events in depth it is worth

noting that both incidents highlight the limits to what can and cannot be said and

underscored the effectiveness of the management of the Internet. These two events

have been used to rally the country behind the CCP as the saviors of the nation so as

to reinforce their authority over the country. In the case of the Tibet the riots the

regime was backed by a cacophony of support that echoed throughout the Mainland

Internet and in the case of the earthquake united the nation behind the government led

rescue efforts.

Sniffer Packets & Firewalls 175

The Chinese media coverage of the earthquake in Sichuan in May 2008 was marked

by its apparent openness, and as such would make an excellent case study. The

coverage of disasters and accidents is the most significant change I have observed,

and the changes are apparent in the Chinese media coverage of the earthquake. The

government was quick to respond to most aspects the coverage of the quake,

including frequent updates on the number of casualties and the areas affected. Xinhua

and China Central Television (CCTV) interrupted programming to run 24 hour

coverage of the disaster. The disaster was used to rally the people around the CCP and

to promote further openness. The handling of the earthquake was an opportunity for

the CCP to show that they were following through on the Law on Emergency

Responses enacted in November 2007 and the Provisions on the Disclosure of

Government Information, which took effect on the 1st of May 2008 in much the same

way that they did during the Black Kiln Incident. Interestingly the Law on Emergency

Responses erased a provision from the final draft which prohibited the media from

reporting accidents as they emerged ("Commentary: Quick media response reveals

transparent gov't in China," 2008), while the Provisions on the Disclosure of

Government Information is meant to “improve transparency and protect the right to

know and public scrutiny of official acts” ("Commentary: Quick media response

reveals transparent gov't in China," 2008). On May 29 Hu Jintao (Bandurski, 2008b,

n.p.) said that,

1. Chinese media, particularly state media, must “keep a firm grasp” on initiative in reporting.2. China needs to raise the effectiveness of news, reporting at the first available moment.3. China needs to increase the transparency of news reporting. 4. China needs to utilize the strengths of all kinds of media, including the Internet and the mobile phone network.

The development and the improvements in the transparency of the reporting of

disasters has enabled Beijing as the centre to take the upper hand in reinforcing its

position of authority over the provincial governments at the margins, and thus enables

Beijing to take control over the narrative of events. This has been evident in many of

the examples used throughout this thesis where provincial governments have sought

to cover up information from the central government. These examples have also

highlighted the tensions and negotiations of centre/margin relationships. David

Sniffer Packets & Firewalls 176

Bandurski (2008b) of the Chinese Media Project argues that the apparent transparency

on the reporting of disasters is a more nuanced strategy for maintaining control over

the media. He writes that:

This means, essentially, that leaders have recognized the disadvantage of hitting hard with control initially, and then opening up only after pressure has been applied (by the public, by international media, etc.). SARS in 2003 was the perfect example of this, and Tibet arguably was too. By moving first (先发制人 for you Sun Tzu fans) with timely reporting, the government can, to a certain degree, control the direction of coverage more effectively.

Examples in this thesis such as the Black Kiln Incident, Chongqing nailhouse, the

protests over the Xiamen PX (paraxylene) plant in Fujian, are often hailed as a sign

that the Internet will force China to become more democratic. Much has been made of

the democratizing potential of the Internet because it is mythologized that the

technology is uncontrollable. If China’s political processes are becoming more open

the Internet is only one aspect of that process and it is because the CCP wants and has

allowed this, it’s not simply as a result of the development of the technology. The

adherence to the Open Door Policy is behind the opening up of the economy and any

attempts to reform the political system, and at present the current leadership of the

CCP remain committed to this ideal, in principle at least.

Hu Jintao’s report to the 17th Party Congress in 2007 called for reform of the political

system and increased forms of public participation in the political process, and

following his speech some experimentation at the margins has begun. On the

concluding day of the annual session of the National Peoples Congress in March 2007

Premier Wen Jiabao said “we must promote reform in the political system. We should

work to diffuse concentration of power and enhance public supervision of the

government. All the decisions on administrative approval, particularly those

concerning the interests of the general public, must be made in an open, fair and

transparent way” ("Officials have no power except for the people," 2007).

Debate on some issues relating to the Internet appear to be opening up, for example

there appears to be a degree of open debate about the introduction of real name

Sniffer Packets & Firewalls 177

registration for Bloggers and online gamers. There was also some open resistance to

these proposals originally and in the end the final regulations have been watered

down. The Internet provides a window on public opinion and is being used to promote

a CCP version of democracy that involves a higher degree of public consultation.

There is some opening of the political process and there seems to be an increasing

level of public consultation, though the degree to which this is being done is hard to

gauge as in some instances it looks as though it is still heavily staged managed. This

was evident in the case of the nail house and the property law that was established.

The Starbucks incident in the Forbidden City was stage managed, and many aspect of

the Brick Kiln incident were stage managed in the media. It is worth re-stating at this

point that 60% of Internet users are aged between 18-35 and most of those are urban

dwellers, so it is really only a narrow window on public opinion ((CNNIC), 2008).

There is a dialectic of desire and control for the technology that is represented in both

Western and Chinese media and that dialectic is managed in order to maintain social

order, or as it is often put by the current leadership of the CCP, as the promotion of a

‘harmonious society’. The promotion of a harmonious society is like a grand narrative

for all policy objectives not just within the cultural sector but all sectors of society and

the economy. It is also about Hu Jintao putting his stamp on the Chinese political

landscape for the future.

All countries connected to the Internet are grappling with the dialectic of desire and

control, as all governments that want the Internet also have to deal with what they

perceive to be the negative consequences of the technology. In the USA it is feared

that terrorists will use the Internet to attack the country, in Germany and France it is

feared that the Internet will be used to promote racial unrest. In all cases there seems

to be the fear that the Internet has the potential to create social unrest; China is not

alone on that score. The main priority of the CCP is the preservation of their position

as the rulers of the PRC, as they steer the country through a tumultuous change that

involves all aspects of Chinese society and culture and not just what appears on the

Internet. What the Internet does is to reveal gaps through which images and voices

can escape, and when they do the CCP looks for a way to close the gap. At the same

time the Internet is used to promote and to preserve the CCP’s position by absorbing

the Internet into existing methods of managing information by perpetuating the CCP

Sniffer Packets & Firewalls 178

line. Essentially this thesis maps the dialectic and the process via looking at the

strategies that the CCP has used to grapple with the consequences of the use and

adoption of the technology. That is through code, content and legislation.

The main way that the CCP has sought to preserve their position through the

maintenance of the flow of Information on the Internet is through the architecture or

code that is used to construct the Internet and through the legal framework. Both these

mechanisms are used to shape the content. The architecture has surveillance points

built into it to prevent certain types of information from going in or out of the PRC.

The Golden Shield Project is a remote surveillance system that will have face

recognition capabilities and the be able to monitor phone calls and be linked to

databases with immediate access to the registration records of every Chinese citizen

To support this further there is an army of people engaged in surveillance and

regulation of what can and cannot be said by deleting postings on BBS and steering

conversations towards a government sanctioned point of view. The legal framework is

also used to shape content by defining legally what can and cannot be said. In addition

to this there has been heavy investment in the development of content. The main

source of content and news in particular comes from official government sources, and

in the gaming sector there has also been a high level of investment. Even the most

popular BBS is run by the Peoples Daily Strong Nation Forum Qianggou 强国.

The limits of censorship and the boundaries of what can be said are constantly being

tested. In addition to this, civil liberties groups in the west are attempting to facilitate

free speech through projects that aim to provide Chinese netizens, and other Internet

users in countries where there are high levels of control, web browsing tools to

circumnavigate government filters and to access unfiltered Internet access. The list of

topics that seem to be permanently banned are the Dali Lama, Taiwan independence,

Falun Gong, Tiananmen Square Protests of 1989 freedom of speech and access to

Marxist sites. Despite the concerted efforts of groups in the West to facilitate more

open access for Chinese netizens the Great Firewall remains, and by and large it does

so because the CCP want it that way. As Goldsmith and Wu argue “as the China

example shows, a government’s failure to crack down on certain types of Internet

Sniffer Packets & Firewalls 179

communication ultimately reflects a failure of interest or will, not a failure of power”

(Goldsmith & Wu, 2006b, p. 89).

The case studies have mapped the dialectic of control and desire for the technology

for its economic benefits and the perceived need to control the technology for the

CCP’s political purposes. This is particularly evident in the development of online

games, where the games are promoted as an economic gain and demonised as the

cause of addiction and the erosion of traditional values. The promotion of blogs has

been much more conservative. However they are seen to some extent as a vehicle for

government opinion. The incidents that make up these case studies have shown the

CCP allows protests to flourish when the demands are consistent with the party and

their policies; and when they are not they are silenced. The Belgrade Embassy

bombing, the spy plane incident, the mine accidents and slavery incident and the

Starbucks in the Forbidden City are all incidents when public opinion matched the

wishes of the CCP. As the case studies show, the incidents where there seems to be

some simpatico of public opinion and the wishes of the CCP, in particular incidents

that strike a chord with nationalists sentiments there is a certain amount of freedom of

expression. Such incidents include the embassy bombing, the spy plane incident and

the Starbucks issue. This lies in stark contrast to the absence of any alternative view to

that of the government and the continued practice of locking up political activists.

The case studies are also illustrative of the double rearticulation of the CCP’s position

in a number of areas, as all these incidents were played out to some degree in the

international media as well as specific mediaspheres in the USA and in China. The

Belgrade bombing and the spy plane are the most obvious here, as to some degree the

negotiations and the diplomacy was played out in the media of both countries. The

role of the media in an international incident such as these is a moment when the

audience is not just ordinary citizens but another opportunity to define and speak with

the other. What marks the space of the Internet here is that the incident is played out

at the official and unofficial level, but in the case of China the unofficial is closely

defined and shaped by the CCP.

Western News coverage of these events often held up the use of the Internet as some

sort of proof of the power of the technology to shape public opinion and shift public

Sniffer Packets & Firewalls 180

policy, and though superficially there seems to have been some shifts in public policy

as a consequence of these incidents they were all engineered to some extent by the

CCP, in particular the debate about the location of Starbucks in the Forbidden City.

The blog that kicked off the debate again in January 2007 was by the high profile Rui

Chengeng CCTV news anchor on CCTV4 and columnist for the Beijing Youth Daily,

and his blog is attached to the channel’s website. By virtue of his position this man

knows what a safe topic is. The blog is a part of his job and as such is sanctioned the

CCP because it is attached to CCTV, and the Beijing Youth Daily was founded by the

Communist Youth League and is owned by the Beijing Municipal Government. “

The Brick Kiln incident in which an estimated 600 adults and 29 children were freed

from slavery in Henan and Shanxi coincided with a crackdown on the use of child

labour in the lead up to the 2008 Olympics. This incident should also be viewed

within the wider context of anti corruption campaigns and crackdowns on unsafe and

illegal mines and factories and the use of slave labour. As Xinhua put it “it is high

time the government stepped up labour protection and spurred idle officials to do their

jobs properly if we are to come even close to building a “harmonious society”

(Xinhua, 2007). So even though the incident was sparked by the online letter signed

by 400 fathers it was allowable and used publicly to promote a view sanctioned by the

CCP, and of course Xinhua is a party mouthpiece.

The Falun Gong demonstrations and the aftermath of the Jianxi school explosion were

not of any use to the government in terms of advancing an existing campaign or

consensus building for a particular issue. These incidents constitute more serious gaps

in the Great Firewall because both incidents represent the boundaries of freedom of

expression in the PRC as defined by the CCP. In both cases the CCP was caught off

guard, but they were effectively able to swiftly silence those involved. It is easier to

define these incidents as public dissent because the CCP was opposed to the position

taken by those involved. The strategies of informational containment have been

applied in other instances such as the Huaxi riots in 2005 covered in chapter five.

There is a shift from a mode that is dominated by traditional propaganda to a method

based on modern western political spin, where public opinion and perceptions are

directed through careful stage management of events and their subsequent portrayal in

Sniffer Packets & Firewalls 181

the media. As such China is not moving towards western style democracy but is

moving towards a state corporatist or bureaucratic authoritarian system that is similar

to Singapore, and politics and public life will continue to be scripted and stage

managed. Cracks will no doubt continue to appear, but the CCP has adapted to the

changing media environment that has been facilitated by the development of the

Internet.

Ultimately it will not be the Internet alone that will act as a catalyst for reforms to the

political system. The Beijing Olympics and China’s increasing participation in

international affairs, both politically and economically, has also had a big impact on

pushing the CCP towards reforming the political system. Following Steven

Spielberg’s resignation from the Olympic Games over China’s involvement with the

Sudanese government, the CCP renewed talks with the USA on human rights. In

April 2007 the ‘Open Government Regulations’ were adopted that promise “public

access to information on a range of issues including government spending, drug and

food safety, and land seizures” ("Road of free information flow cautious but resolute

", 2007). The regulations take effect in May, three months before the commencement

of the Beijing Olympics. The games has thrown China into the centre of the

international stage and highlighted the arrest of dissidents such as Hu Jia and Zheng

Jinyan, the CCP’s involvement with the Government in Dafur and the appalling level

of pollution in the nation’s capital. The CCP’s response to this has been to call for the

games not to be politicized, while responding to some aspects and continuing with

business as usual with others. China’s relationship with the international community

is mapped out via the media and this becomes the site or vehicle through which centre

margin relationships can be viewed.

Sniffer Packets & Firewalls 182

BIBLIOGRAPHY

(CNNIC), C. I. N. I. C. (1997). 1st Survey Report: China Internet Network Information Center.

(CNNIC), C. I. N. I. C. (2007). The 20th CNNIC Statistical Survey Report on the Internet Development in China. Retrieved August 2007, 2007, from http://www.cnnic.net.cn/download/2007/20thCNNICreport-en.pdf

(CNNIC), C. I. N. I. C. (2008). Statistical Survey Report on the Internet Development in China (January 2008) (No. 21). Beijing: China Internet Network Information Center (CNNIC).

ABC Online gets China's okay. (2002, Posted: Wed, 24 Apr 2002 19:13 AEST). 2002, from http://search.abc.net.au/search/cache.cgi?collection=abcall&doc=http/www.abc.net.au/news/justin/nat/newsnat-24apr2002-94.htm

Access Denied Map: Mapping Web 2.0 Censorship. (2007). Journal. ‘Retrieved from’ http://advocacy.globalvoicesonline.org/maps/

America's Army Game. (2007). Retrieved 12/9/07, 2007, from http://www.goarmy.com/aarmy/

Anderson, B. (1993). Imagined Communities Reflections on the Origin and Spread of Nationalism (Revised ed.). London: Verso.

Anti-AIDS Leader Freed. (2002). Journal. ‘Retrieved from’ http://www.china.org.cn/english/2002/Sep/43727.htm

Anti-corruption game shut down after less than a month. (2007, 28/8/07). China Daily Retrieved 28/8/07, from http://www.chinadaily.com.cn/china/2007-08/28/content_6062692.htm

"Anti-Japan War Online" game to hit the market. (2005, 12/9/07). Xinhua News Agency, from http://news.xinhuanet.com/english/2005-08/31/content_3426802.htm

Arrest of Alleged Child Arsonists for Internet Cafe Fire Shocks China (2002, June 2002). People's Daily Online Retrieved Thursday, June 20, 2002 from http://english.peopledaily.com.cn/200206/20/eng20020620_98229.shtml

Bagchi, I. (2008, 5/05/08). China mounts cyber attacks on Indian sites. Retrieved 5/5/08, 2008, from http://timesofindia.indiatimes.com/articleshow/msid-3010288,prtpage-1.cms

Bandurski, D. (2007a). Chinese leaders meditate loudly on the philosophy of censorship as 17th Congress nears. Journal. ‘Retrieved from’ http://cmp.hku.hk/2007/08/30/584/

Bandurski, D. (2007b). “ Tolerance evaporates ” : Editors from two ill-fated journals try in vain to reason with Chinese authorities. Journal. ‘Retrieved from’ http://cmp.hku.hk/2007/12/06/766/

Bandurski, D. (2008a, 14/08/08). China’s Guerrilla War for the Web. Far Eastern Economic Review, from http://www.feer.com/essays/2008/august/chinas-guerrilla-war-for-the-web

Bandurski, D. (2008b). Guangdong journalists recalled from the earthquake zone. Retrieved 5/6/08, 2008, from http://cmp.hku.hk/2008/06/04/1047/

Barboza, D. (2008). Bloggers Push China to Prosecute Beating Death Journal. ‘Retrieved from’ http://www.nytimes.com/2008/01/18/world/asia/18china.html?_r=2&oref=slogin&partner=rssnyt&emc=rss&pagewanted=print

Sniffer Packets & Firewalls 183

Berkman Center for Internet & Society Harvard Law School. (2002, September 24, 2002). Replacement of Google with Alternative Search Systems in China Documentation and Screen Shots. from http://cyber.law.harvard.edu/filtering/china/google-replacements/

Beyrer, C., & Csete , J. (2003). An epidemic of denial. Harvard International Review 25(2), 64.

Bezlova, A. (2005). HEALTH: CHINA BEGINS WAKING UP TO THE SPECTER OF HIV/AIDS. Global Information Network

Blog censorship handbook released. (2007). Journal, (2005/09/22 11:05:31 GMT). ‘Retrieved from’ http://news.bbc.co.uk/go/pr/fr/-/2/hi/technology/4271062.stm

Bones, skeletons buried in Chinese version of fantasy game. (2007, July 2007). People's Daily Online Retrieved 12/07/07, 2007, from http://english.people.com.cn/90001/90782/90875/6213865.pdf

Boyle, J. (1997). Foucault In Cyberspace:Surveillance, Sovereignty, and Hard-Wired Censors Retrieved 28 May 2006, 2006, from http://www.law.duke.edu/boylesite/Brady, A.-M. (2002). Regimenting the Public Mind: The Modernisation of

Propaganda in the PRC. International Journal 57(4, Autumn 2002.).Brady, A.-M. (2006). Guiding Hand: The Role of the CCP Central Propaganda

Department in the Current Era. Westminster Papers in Communication and Culture 31(Spring), 58-77.

Bristow, M. (2007). Web dissent on the rise in China. Journal. ‘Retrieved from’ http://news.bbc.co.uk/2/hi/asia-pacific/7045744.stm

Buruma, I. (1999). China in Cyberspace. November 4 1999. Retrieved 29/10/1999, from http://www.nybooks.com/nyrev/wwwfeatdisplay.cgi?199991104009f

Cai, J. (2006). CHINA: Internet patrol system extended. Journal. ‘Retrieved from’ http://www.asiamedia.ucla.edu/article-eastasia.asp? parentid=45562

Carey, J. W. (1989). Space Time and Communications: A Tribute to Harold Innis. In Hyams (Ed.), Communication as Culture: Essays on Media and Society. London: Unwin.

cDc launches global campaign against Google. (2006). Journal. ‘Retrieved from’ http://www.cultdeadcow.com/archives/2006/02/cdc_launches_global_.php3

Central government forms work team to investigate into "slave labor" incident. (2007). Journal, (09:39, June 16, 2007). ‘Retrieved from’ http://english.people.com.cn/200706/16/eng20070616_384858.html

Chase, M., & Mulvenon, J. (2002). You've Got Dissent! Chinese Dissidencts Use of the Internet and Beijing's Counter-Strategies Santa Monica: RAND

Cheap World of WarCraft Gold, Buy World of Warcraft Gold. (2007, 2007 ). Retrieved 15/09/07, 2007, from http://www.world-of-warcraft-gold.com/

Chen, K., & Fowler, G. A. (2006). Microsoft Defends Censoring a Dissident's Blog in China Journal. ‘Retrieved from’ http://chinadigitaltimes.net/2006/01/microsoft_defends_censoring_a_dissidents_blog_in_china.php

Chen, Q. (2005, June 10, 2005). China's 'Safesurf' Website Turns One. 2006, from http://service.china.org.cn/link/wcm/Show_Text?info_id=131614&p_qry=in...

Chen, W. (2007). The Nailhouse Case and the Birth of Citizen Journalism. Journal, (March 29, 2007.). ‘Retrieved from’ http://zonaeuropa.com/20070331_1.htm

Sniffer Packets & Firewalls 184

China's anti-hacking alliance regrouped. (2005). Journal, (24/04/05). ‘Retrieved from’ http://english.peopledaily.com.cn/200504/26/print20050426_182719.html

China's First Authorized News Website Launched. (2000). Journal. ‘Retrieved. doi:RN: A59903560

China's main blog service providers subscribe to self-discipline code (2007). Journal, (09:03, August 22, 2007 ). ‘Retrieved from’ http://english.people.com.cn/90001/90778/6245199.html

China's online game industry enjoys galloping development. (2006, 15/9/07). People's Daily Online Retrieved 08:21, January 12, 2006, from http://english.people.com.cn/200601/12/eng20060112_234786.html

China's online game industry on a roll. (2007, 2007-04-13 ). China Daily Retrieved13/07/07, 2007, from http://www.chinadaily.com.cn/china/2007-04/13/content_850411.htm

China's parliament starts annual session with focus on social harmony. (2007, 13:13, March 05, 2007). People's Daily Online. Retrieved June 2007, 2007, from http://english.people.com.cn/200703/05/eng20070305_354288.html

China's PLA Prepares For Network Warfare (1999). Journal. ‘Retrieved from’ http://www.chinaonline.com/industry/infotech/NewsArchive/Secure/1999/november/C9111102.asp

China brickwork slave children may number 1,000. (2007, 2007-06-15 23:50). People's Daily Online. Retrieved 2007-06-15 2007, from http://www.chinadaily.com.cn/china/2007-06/15/content_895588.htm

China censors online video games. (2004, Tuesday, 1 June, 2004, 10:32 GMT 11:32 UK ). Online. Retrieved 27/8/07, 2007, from http://news.bbc.co.uk/2/hi/technology/3766023.stm

China cracks down on 'virtual money' (2007, 26/09/2007). The Age, from http://www.theage.com.au/news/games/china-cracks-down-on-virtual-money/2007/03/08/1173166819859.html#

China denies U.S. charge it hacked Pentagon network. (2007). Journal, (19:52, September 04, 2007). ‘Retrieved from’ http://english.people.com.cn/90001/90776/6254757.html

China Disapproves Use of 'Axis of Evil' in International Relations. (2002). Peoples' Daily Online Tuesday, February 05, 2002. Retrieved 20 June 2007, 2007, from http://english.people.com.cn/200202/04/eng20020204_89911.shtml

China eases off proposal for real-name registration of bloggers. (2007). Journal, (May 23, 2007). ‘Retrieved from’ http://english.people.com.cn/200705/22/eng20070522_376909.html

China has 20.8 million bloggers. (2007). Journal. ‘Retrieved China heroes mark time before foreign Web game assault. (2006, 28/8/07). from

http://www.chinadaily.com.cn/china/2006-08/29/content_676900.htmChina internet firms 'self-censoring'. (2002). Journal. ‘Retrieved from’

http://news.bbc.co.uk/hi/english/world/asia-pacific/newsid_2098000/2098530.stm

China investigates dereliction of duty in forced labor scandal. (2007, 20/06/07). Retrieved 20/06/07, 2007, from http://news.xinhuanet.com/english/2007-06/20/content_6268689.htm

China makes 3 traditional festivals holidays. (2007). Journal, (16/12/2007). ‘Retrieved from’ http://www.chinadaily.com.cn/china/2007-12/16/content_6324571.htm

Sniffer Packets & Firewalls 185

China orders crackdown on labor abuse. (2007, 2007-06-19 17:05). China Daily. Retrieved 2007-06-19, 2007, from http://www.chinadaily.com.cn/china/2007-06/19/content_897777.htm

China Raids Blogger's Home, as Political Arrests Double. (2007). Journal. ‘Retrieved from’ http://www.rfa.org/english/china/2007/11/30/china_internet/

China Slams Local, Foreign Media Over School Blast. (2001, March 12, 2001). March 12, 2001. Retrieved 07/06/2001, 2001, from http://www.insidechina.com/news.php3?id=308127&brief=text

China targets 750 firms in war on pollution (2007). Journal. ‘Retrieved from’ http://www.straitstimes.com/Latest+News/Asia/STIStory_154648.html

China to Develop Online Games (2004, 19/9/07). China.org.cn Retrieved June 16, 2004, from http://www.china.org.cn/english/scitech/98387.htm

China to establish national centre to receive public complaints. (2007). Journal. ‘Retrieved from’ http://english.people.com.cn/200706/25/print20070625_387306.html

China to help clean up the Internet. (2007, 4/23/2007 10:51 AM). Retrieved 15/7/07, 2007, from http://www.usatoday.com/tech/news/2007-04-23-china-civilized-net_N.htm

China to launch nationwide labor investigation after "brick kiln scandal". (2007). Journal, (08:28, June 21, 2007). ‘Retrieved from’ http://english.people.com.cn/200706/21/eng20070621_386168.html

China trembles at the power of the blog. (2007). Journal, (31 August 2007). ‘Retrieved from’ http://news.independent.co.uk/media/article2836677.ece

China Youth Daily editorial calls for greater professionalism in Chongqing "nail house" reports. (2007). Journal, (March 29 2007). ‘Retrieved from’ http://cmp.hku.hk/look/article.tpl?IdLanguage=1&IdPublication=1&NrIssue=1&NrSec...

CHINA: Beijing launches Internet cafe crackdown. (2006). Journal. ‘Retrieved from’ http://www.asiamedia.ucla.edu/print.asp?parentid=45468

CHINA: Google conforms to censorship. (2004). Monday, September 27, 2004. Retrieved 24/4/2006, 2006, from http://www.asiamedia.ucla.edu/article.asp?parentid=15153

China: House Arrests Stifle HIV/AIDS Petitions. (2006). Journal. ‘Retrieved from’ http://hrw.org/english/docs/2006/03/11/china12874.htm

CHINA: Volunteers help Beijing control Internet (2006a). Journal. ‘Retrieved from’ http://www.asiamedia.ucla.edu/article-eastasia.asp? parentid=45555

CHINA: Volunteers help Beijing control Internet (2006b). Journal. ‘Retrieved from’ http://www.asiamedia.ucla.edu/article-eastasia.asp? parentid=45555

China: Who are the chengguan? Journal. ‘Retrieved from’ http://rfaunplugged.wordpress.com/2008/01/09/china-who-are-the-chengguan/

Chinalaw Home Page. (1999). 1999, from http://www.qis.net/chinalaw/lawtran1.htmChinese bloggers to reach 100 million in 2007. (2006). Journal, (06-05-2006 10:29:).

‘Retrieved from’ http://news.xinhuanet.com/english/2006-05/06/content_4513589.htm

Chinese Bloggers, Podcasters and Webcasters. (2005). Journal. ‘Retrieved from’ http://zonaeuropa.com/20050918_1.htm

Chinese Environmental NGOs Called on to Play a Bigger Role (2006). Journal. ‘Retrieved from’ http://www.china.org.cn/english/environment/186754.htm

Chinese Government Forbids Media Reporting of The "Nailhouse" Story. (2007). Journal, (2007-03-24). ‘Retrieved from’

Sniffer Packets & Firewalls 186

http://chinadigitaltimes.net/2007/03/chinese_government_forbidden_media_reports_about_the_na.php

Chinese Heroes vs. World of Warcraft (2006, 19/9/07). People's Daily Online Retrieved August 30, 2006, from http://english.people.com.cn/200608/30/eng20060830_298142.html

Chinese Internet Police. (2000, Saturday, August 05, 2000, updated at 08:52(GMT+8)). from http://english.people.com.cn/english/200008/05/eng20000805_47390.html

Chinese president delivers keynote speech on national development (2007, 08:05, June 26, 2007). People's Daily. Retrieved June 26, 2007, 2007, from http://english.people.com.cn/200706/26/eng20070626_387526.html

Citizen Reporters On The Huankantou/Huaxi Incident. (2005). Journal. ‘Retrieved from’ http://zonaeuropa.com/20050524_1.htm

Citizens cherish memory of Lugouqiao Incident. (2006, 23/9/07). People's Daily Online, from http://english.people.com.cn/200607/08/eng20060708_281284.html

CNNIC. (2007). CNNIC Releases 2007 Survey Report on China Weblog Market Number of Blog Writers Reaches 47 million Equaling One Fourth of Total Netizens.

CNNIC Urges Websites To Use CN Domain Name. (2007). Retrieved 23 May 2007, 2007, from http://www.isc.org.cn/20020417/ca408341.htm

Cody, E. (2005, Monday, June 13, 2005). For Chinese, Peasant Revolt Is Rare Victory Farmers Beat Back Police In Battle Over Pollution. Washington Post Foreign Service, p. A01, from http://www.washingtonpost.com/wp-dyn/content/article/2005/06/12/AR2005061201531.html

Commentary: Quick media response reveals transparent gov't in China. (2008, Monday, May 26, 2008). Monday, May 26, 2008. Retrieved 26/5/08, 2008, from http://english.pladaily.com.cn/site2/news-channels/2008-05/24/content_1272355.htm

Comor, E. (2001). Harold Innis and the Bias of Communication. Information, Communication & Society, 4(2), 274-294.

Company chairman arrested for instigating social unrest (2007). Journal, (December 12, 2007). ‘Retrieved from’ http://www.china.org.cn/english/China/235277.htm

Computer Games to Get Suitability Ratings. (2006, 9/9/07). China.org.cn, from http://www.china.org.cn/english/2006/Oct/184682.htm

Cox, R. W. (1995). Civilizations: encounters and transformations. Studies inPolitical Economy 47, 7-31.Cult hinders viewers seeing media reports. (2003, 2003-10-17 08:30:35). 2005, from

http://www.chinadaily.com.cn/english/doc/2004-03/04/content_311483.htmCurren, J., & Gurevitch, M. (Eds.). (1991). Mass Media and Democracy', in Mass

media and society. London, New York, Melbourne, Auckland:: Edward Arnold.

Dalpino, C. (2000). Despairing Democracy: Promoting Openness In Authoritarian Regimes. Washington D. C.: Brookings Institution Press.

Defiant China hits out at US, stands firm on Internet. (2008, 02/10/08). Jul 29, 2008. Retrieved 02/10/08, from http://afp.google.com/article/ALeqM5jPl75iNlA5thQKGfw4Sa26Xa2V6Q

Deibert, R. J. (1997). Parchemnt, Printing, and Hypermedia Communication in World Order Transformation. New York: Columbia Univeristy Press.

Sniffer Packets & Firewalls 187

Deibert, R. J. (1997). Parchment, Printing, and Hypermedia Communication in World Order Transformation. New York: Columbia University Press.

Deibert, R. J., Palfrey, J. G., Rohozinski, R., & Zittrain, J. (Eds.). (2008). Access Denied

The Practice and Policy of Global Internet Filtering. Cambridge: The MIT Press.Drache, D., & Beyer, R. (1996). States Against Markets: The Limits of Globalisation.

London: Routledge.Dual Tactics Adopted to Ensure Information Security in China. (2001). Journal,

(06/06/2001). ‘Retrieved from’ http://www.china.org.cn/english/14157.htmEhrenberg, J. (1999). Civil Society: The Critical History of an Idea. New York: New

York University Press.Endeshaw, A. (2004). Internet Regulation in China: The Never Ending Cat and

Mouse Game. Information and Communications Technology Law, 13(One), 41 - 57.

Environmental Activists Detained in Hangzhou (2005). Journal. ‘Retrieved from’ http://www.hrichina.org/public/contents/press?revision_id=25771&item_id=25770

Environmental NGOs Encouraging Green Actions (2007, 2007-11-09 ). 2007-11-09 Retrieved 15/11/07, 2007, from http://english.sepa.gov.cn/zwxx/hjyw/200711/t20071109_112767.htm

Fan, M. (2007). Provinces Undermine Beijing's Goals on AIDS. Journal, (Wednesday, September 19, 2007). ‘Retrieved from’ http://www.washingtonpost.com/wp-dyn/content/article/2007/09/18/AR20070918020...

Fantasy Westward Journey. Retrieved 9/9/07, 2007, from http://corp.163.com/eng/games/fantacy_westward.html

Farrell, N. (2002). Chinese crackers prepare for cyber war. Journal, (23 May 2002). ‘Retrieved from’ http://www.vnunet.com/articles/print/2118852

FBI Tosses Carnivore to the Dogs. (2005, 2005-01-19 09:07:00.0). Retrieved 10 May 2006, 2006, from http://www.wired.com/news/privacy/0,1848,66327,00.html

Ferguson, M. (1992). The Mythology About Globalization. European Journal of Communication, 7(1), 69-93.

First Net Security Law Endorsed (2000). Journal, (2/12/2000). ‘Retrieved from’ http://www.china.org.cn/english/2000/Dec/5888.htm

Flew, T. (2008). New Media An Introduction (3 ed.). South Melbourne: Oxford University Press.

Foucault, M. (1979). Discipline and punish : the birth of the prison. Harmondsworth: Penguin.

Foucault, M., & Miskowiec, J. (1986). Of Other Spaces. Diacritics, 16(No.1 Spring ), 22-27.

Freedom of Identity, Speech and Assembly on the Internet. (2007, 10/7/06). 10/7/06. Retrieved 5/9/07, 2007, from http://www.zonaeuropa.com/20060710_1.htm

French, H. W. (2005). Anger in China Rises Over Threat to Environment (Publication. Retrieved 25/10/07: http://www.nytimes.com/2005/07/19/international/asia/19china.html?_r=1&pagewant...

Funnell, A. (2007, 12 July 2007). Three perspectives on China 12 July 2007. Retrieved 12 July 2007, 2007, from

http://www.abc.net.au/rn/mediareport/stories/2007/1974183.htm

Sniffer Packets & Firewalls 188

Gamers to Register Real IDs. (2006, March 21, 2006). 2007, from http://www.china.org.cn/english/Life/162728.htm

Gao, Y. (2001). My AIDS Prevention Journey. Journal. ‘Retrieved from’ http://www.usembassy-china.org.cn/sandt/gaoyaojie--aidsprevention.html

Gao, Y. ( My "AIDS Prevention Journey). Journal. ‘Retrieved from’ http://www.usembassy-china.org.cn/sandt/gaoyaojie--aidsprevention.html

Goldkorn, J. (2007). Property rights: the coolest nail house in history. Journal. ‘Retrieved from’ http://www.danwei.org/bbs/property_rights_the_coolest_na.php

Goldsmith, J., & Wu, T. (2006a). Who Controls the Interent? Illusions of a Boarderless World. New York: Oxford University Press.

Goldsmith, J., & Wu, T. (2006b). Who Controls the Internet? Illusions of a Borderless World. New York: Oxford University Press.

Goodman, D. S., & Hooper, B. (Eds.). (1994). China's Quiet Revolution New Interactions Between State and Society. New York: Longman and Cheshire.

Goodman, D. S., & Segal, G. (Eds.). (1994). China Deconstructs: Politics Trade and Regionalism. London: Routledge.

Gov't transparency in quake relief not "forced reaction" for hosting Olympics (2008, 26/5/08). Retrieved 26/5/08, 2008, from http://news.xinhuanet.com/english/2008-05/26/content_8257840.htm

Government to Ban Trade in Foreign Encryption Software (2000). Journal, (Thursday, February 24, 2000, updated at 16:58(GMT+8)). ‘Retrieved from’ http://www.peopledaily.com.cn/english/200002/21/eng20000221T121.html

Guan, X. (2007, 2007-05-25 ). NGOs have more room to develop. China Daily, from http://www.chinadaily.com.cn/china/2007-05/25/content_880124.htm

Habermas, J. (1974). The Public Sphere: An Encyclopedia article New German Critique, 3(Autum), 49-55.

Habermas, J. (1989). The Structural Transformation of the Public Sphere. Cambridge Mas: MIT Press.

Hacker gives Kuomintang Web site pro-Chinese look with PRC photos (2004). Journal, ( 2004-05-10). ‘Retrieved from’ http://www.infowar-monitor.net/modules.php?op=modload&name=News&file=article&sid=970&mode=thread&order=0&thold=0

Hackers target web censorship. (2002, 20/20/07). BBC News, from http://news.bbc.co.uk/2/hi/science/nature/2129390.stm

Hackers Wreak Havoc with Nike. (2004). Journal, (December 31, 2004). ‘Retrieved from’ http://www.china.org.cn/english/2004/Dec/116507.htm

Hacktivismo Launches ScatterChat for Secure, Private Communication. (2006, July 21, 2006). Retrieved 12/10/07, 2007, from http://mediaserver.prweb.com/pdfdownload/414312/pr.pdf

Han, P. (2007, 2007-06-22 15:34:20). Supreme Procuratorate to amend regulations on official corruption Xinhua News Agency, from http://news.xinhuanet.com/english/2007-06/22/content_6278182.htm

Handbook for bloggers and cyber-dissidents (Publication. (Unknown). Retrieved 10/10/07, from Reporters Without Borders: http://www.rsf.org/rubrique.php3?id_rubrique=542

Hartford, K. (2000). Cyberspace with Chinese Characteristics. Current History(September).

Hartley, J. (1992). The Politics of Pictures The Creation of the Public in the Age of Popular Media. London: Routledge.

Sniffer Packets & Firewalls 189

Hemelryk Donald, S., Keane, M., & Hong, Y. (Eds.). (2001). Media in China Consumption, Content, and Crisis: Curzon Press Ltd.

Hennock, M. (2002). The cost of China's web censors. Journal. ‘Retrieved from’ http://news.bbc.co.uk/2/hi/business/2264508.stm

Hesseldahl, A. (1998). Hacking for Human Rights? Journal, (09:15 AM Jul. 14, 1998 PT). ‘Retrieved from’ http://www.wired.com/news/politics/0,1283,13693,00.html

Hong Kong Activist Says Chinese Hackers Read His E-mails (2005). Journal. ‘Retrieved from’ http://www.rfa.org/english/news/2005/07/02/china_internet/

Horrocks, C. (2004). Introducing Foucault. London: Icon Books.Hottest Topics in Chinese Blogs 2007. (2007). Journal, (August 7, 2007)). ‘Retrieved

from’ http://www.china.org.cn/english/MATERIAL/220070.htmHu, J. (2007a, 15/10/07). Hold High the Great Banner of Socialism with Chinese

Characteristics and Strive for New Victories in Building a Moderately Prosperous Society in all Respects Report to the Seventeenth National Congress of the Communist Party of China on Oct. 15, 2007. Retrieved 15/10/07, 2007, from http://www.chinadaily.com.cn/china/2007-10/25/content_6225977.htm

Hu, J. (2007b). Hu Jintao's report at 17th Party Congress. Journal, (16/10/07). ‘Retrieved from’ http://www.chinadaily.com.cn/china/2007-10/25/content_6226673_4.htm

I Still Believe Some Day I'll Change The World In My Way. (2007, 2/10/07). Chris-daydreamer Blogspot Retrieved APR 25, 2007, from http://chris-daydreamer.blogspot.com/2007/04/isaac-mao-and-michael-anti-at-hong-ko...

Illegal Blood Trade Main Cause of AIDS in Henan. (2007, 26/11/07). China Internet Information Center Retrieved March 13, 2007), from http://www.china.org.cn/english/China/202834.htm

Increase in environmental protests causes instability in China. (2006). Journal, (Wed 06 September 2006). ‘Retrieved from’ http://www.greenclippings.co.za/gc_main/article.php?story=20060906170952367

Industry survey: China's online gaming population exceeds 40 mln. (2008, 16/1/08). People's Daily, from http://english.people.com.cn/90001/90776/6339549.html

Innis, H. A. (1951). The Bias of Communication. Toronto: University of Toronto Press.

Innis, H. A. (1952). Changing concepts of time. Toronto: University of Toronto Press.Innis, H. A. (1972). Empire and Communication (2 ed.). Toronto: University of

Toronto Press.Innis, H. A. (1993). Printing in China in the 19th and 20th Century. Continuum, 7(1),

132-139.Internet Cafes in Beijing Under Scrutiny. (2006, May 12, 2006). Retrieved 13/07/07,

2007, from http://www.china.org.cn/english/government/168160.htmInternet Challenges the Party Line in China. (2001, March 11, 2001). March 11,

2001. Retrieved 07/06/2001, 2001, from http://www.insidechina.com/news.php3?id=307081&brief=text

Internet Filtering in China in 2004-2005: A Country Study. (2005). Journal, 2005. ‘Retrieved from’ http://www.opennetinitiative.net/studies/china/

Jame, F. (1999). China, Taiwan in Web hacking 'war'. Journal, (August 10, 1999, 5:00 PM PT). ‘Retrieved from’ http://www.infowar-monitor.net/modules.php?op=modload&name=News&file=article&sid=137

Sniffer Packets & Firewalls 190

Jenkins, H. (2002, 13/9/07). The Chinese ColumbineHow one tragedy ignited the Chinese government's simmering fears of youth culture

and the Internet. Technology Review Retrieved August 2, 2002, from http://www.technologyreview.com/read_article.aspx?id=12913&ch=infotech&a=f

Jenkins, H. (2006). National Politics within Virtual Game Worlds: The Case of China. Retrieved 8/9/08, 2007, from http://www.henryjenkins.org/2006/08/national_politics_within_virtu_1.html

Jesse, E. (2006). The Cutest New Cops. Newsweek, 0.Johnson, B. (2008). Hackers attack pro-Tibetan websites. Journal, (Thursday April 10

2008 ). ‘Retrieved from’ http://www.guardian.co.uk/world/2008/apr/10/olympicgames2008.china2

Kalathil, S. (2003). China's new media sector: keeping the state in. The Pacific Review, 16 (4), 489-501.

Kalathil, S., & Boas, T. C. (2003). Open Networks Closed Regimes. Washington D. C.: Carnegie Endowment for International Peace.

Kao, X. (2006). How will national online games be able to break into the international market? Paper presented at the China Online Gaming Conference, Chengdu.

Kennedy, J. (2007a). China: Bankrupt ant farmers prepare to protest Journal, (November 20th, 2007). ‘Retrieved from’ http://www.globalvoicesonline.org/2007/11/20/china-bankrupt-ant-farmers-prepare-to-protest/

Kennedy, J. (2007b). China: Nation's first citizen reporter? . Journal. ‘Retrieved from’ http://www.globalvoicesonline.org/2007/03/30/china-nations-first-citizen-reporter/http://www.globalvoicesonline.org/2007/03/30/china-nations-first-citizen-reporter/

Kirk, J. (2006). Microsoft shuts down Chinese blogger's site Journal. ‘Retrieved from’ http://www.infoworld.com/archives/emailPrint.jsp?R=printThis&A=/article/06/01/06/...

Kluver, R. (2005). The Architecture of Control: a Chinese Strategy for e-Governance. Journal of Public Policy, 25(One), 75 -97.

Largest Hacker Group in China Dissolves. (2005). Journal, (February 22, 2005). ‘Retrieved from’ http://www.china.org.cn/english/2005/Feb/120819.htm

Lasker, J. (2004). U.S. Military's Elite Hacker Crew. Journal. ‘Retrieved from’ http://www.wired.com/print/politics/security/news/2005/04/67223

Lawmaker calls to remove Starbucks from Forbidden City. (2007). Journal, 2007(2007-03-12 ). ‘Retrieved from’ http://www.chinadaily.com.cn/2008/2007-03/12/content_825307.htm

Lee, C. C. (1998). China's Media, Media's China. In C. C. Lee (Ed.). Urbana: University of Illinois Press.

Lei Feng becomes online game hero. (2006, 28/8/07). China Daily Retrieved 2006-03-15 15:14, from http://www.chinadaily.com.cn/english/doc/2006-03/15/content_539633.htm

Lessig, L. (2006). Code Version 2. New York: Basic Books.Liu, S.-D. (2006). China's popular nationalism on the Internet report on the 2005 anti-

Japan network struggles. Inter-Asia Cultural Studies, 7(1).Liu, W. (2007). Transparency Key to Public Faith. Journal. ‘Retrieved from’

http://www.chinadaily.com.cn/china/2007-07/16/content_5435353.htm

Sniffer Packets & Firewalls 191

The Long Story About Huaxi/Huankantou. (2005). Journal. ‘Retrieved from’ http://zonaeuropa.com/20050601_1.htm

Loren, B. (2006, @ 12:32 am). Google China Kowtows to Censorship Laws. 1 January 2006. from http://www.searchenginejournal.com/index.php?p=2832

Lull, J. (1991). China Turned On: Television and Resistance. London: Routledge.Ma, Q. (2005). Non-Governmental Organisations in Contemporary China: paving the

way to a civil society? . New York: Routledge.MacKinnon, R. (2006). The Great Chinese Censorship Hoax. Journal, (March 14,

2006). ‘Retrieved from’ http://rconversation.blogs.com/rconversation/2006/03/the_great_chine.html

MacKinnon, R. (2007a). Chinese bloggers thumb their noses at "self discipline". Journal, (August 28, 2007). ‘Retrieved from’ http://rconversation.blogs.com/rconversation/2007/08/chinese-blogg-1.html

MacKinnon, R. (2007b). Flatter world and thicker walls? Blogs, censorship and civic discourse in China. Public Choice(9 June 2007).

MacKinnon, R. (2007c). "Nailhouse blogger" detained & interrogated, web crackdown on "ant farmer" story continues... Journal, (December 07, 2007). ‘Retrieved from’ http://rconversation.blogs.com/rconversation/2007/12/nailhouse-blogg.html

Made-in-China Online Games Available (2004, 20/9/07). China.org.cn Retrieved June 15, 2004, from http://www.china.org.cn/english/China/98409.htm

McLuhan, E., & Zingrone, F. (Eds.). (1997). Essential McLuhan. London: Routledge.McLuhan, M., & Fiore, Q. (1967). The medium is the message. Harmondsworth:

Penguin.McLuhan, M., & Powers, B. R. (1989). The global village : transformations in world

life and media in the 21st century. New York: Oxford University Press.Mendoza, J. (2007). US: Yahoo! settles in Chinese journalists' lawsuitJournal, (Friday, November 16, 2007). ‘Retrieved from’

http://www.asiamedia.ucla.edu/article-world.asp?parentid=82174Merkel's China Visit Marred by Hacking Allegations. (2007). Journal, (August 27,

2007). ‘Retrieved from’ http://www.spiegel.de/international/world/0,1518,502169,00.html

Microsoft revises policy on shutting blogs after China backlash (2006). Journal, (02.01.2006, 01:21 AM). ‘Retrieved from’ http://www.forbes.com/technology/feeds/afx/2006/02/01/afx2490270.html

Military expert: international cooperation to fight hackers. (2007). Journal, (September 23, 2007). ‘Retrieved from’ http://www.china.org.cn/english/China/225476.htm

Millions of Chinese to Become Internet Game Players in 2004 (2004). China.org.cn Retrieved February 5, 2004, from http://www.china.org.cn/english/scitech/86308.htm

Ming, M. (2007). A Notice from the Central Government to Censor News Related to Shanxi Brick Kilns Event: China Digital Times: BERKELEY CHINA INTERNET PROJECT.

Ministry of Culture Solicits Online Games for Minors. (2007, July 10, 2005). Retrieved 12/9/07, 2007, from http://www.china.org.cn/english/2005/Jul/134531.htm

Mooney, P. (2004). China's 'Big Mamas' in a Quandary. Journal. ‘Retrieved from’ http://yaleglobal.yale.edu/display.article?id=3676

Sniffer Packets & Firewalls 192

Most Chinese kids spend vacation online. (2007, 5/9/07). The Age 5/9/07. from http://www.theage.com.au/news/WORLD/Most-Chinese-kids-spend-vacation-online/2007/09/05/1188783280572.html

Mudie, L., & Chen, P. (2008). Well-wishers Detained Outside Hu Jia's Beijing HomeJournal. ‘Retrieved from’ http://www.rfa.org/english/china/2008/01/23/china_hujia/'Nail house' in Chongqing demolished. (2007). Journal. ‘Retrieved from’

http://www.chinadaily.com.cn/china/2007-04/03/content_842221.htmNation Promotes Home-made Online Game Business (2003, 19/9/07). China.org.cn,

from http://www.china.org.cn/english/scitech/81815.htmNew Campaign to Curb Illegal Blood Collection. (2007). Journal, (June 9, 2007)).

‘Retrieved from’ http://www.china.org.cn/english/health/213394.htmNew NGO founded to rally all Chinese people against worsening pollution. (2005).

Journal, (April 24, 2005). ‘Retrieved from’ http://english.peopledaily.com.cn/200504/24/eng20050424_182520.html

New Regulations to Ensure Internet Safety (2005). Journal, (December 30, 2005). ‘Retrieved from’ http://www.china.org.cn/english/government/153719.htm

NGO Alliance to Step Up Fight Against HIV/AIDS (2007). Journal, (March 7, 2007). ‘Retrieved from’ http://www.china.org.cn/english/health/201894.htm

O'Sullivan, T., John Hartley, Saunders, D., Montgomery, M., & Fiske, J. (Eds.). (1994). Key Concepts in Communication and Cutural Studies (2 ed.). London: Routledge.

Office of the Secretary of Defense. (2003). Military Power of the People’s Republic of China. Retrieved. from http://www.defenselink.mil/news/Jul2005/d20050719china.pdf.

Office of the Secretary of Defense. (2007). Military Power of the People’s Republic of China 2007 ANNUAL REPORT TO CONGRESS. Retrieved 13/10/07. from www.defenselink.mil/pubs/pdfs/China%20Report%202006.pdf

Officials have no power except for the people. (2007, 19 June 2007). People's Daily Online Retrieved 19 March 2007, from http://english.people.com.cn/200703/19/eng20070319_358925.html

Olesen, A. (2000). China Reverses Encryption Regulations. Journal, (March 14, 2000). ‘Retrieved from’ http://www.virtualchina.com/news/mar00/031400-cryptoreg-alo-jsl.html.

Online Game Industry Enjoys Galloping Development. (2006, January 12, 2006). Retrieved 13/07/07, 2007, from http://www.china.org.cn/english/BAT/154888.htm

Para-police officials condemn beating death of man in Hubei. (2008). Journal. ‘Retrieved from’ http://www.chinadaily.com.cn/china/2008-01/21/content_6409247.htm

Peace pact with Taiwan proposed. (2007). Journal, (08:18, October 16, 2007 ). ‘Retrieved from’ http://english.people.com.cn/90001/90776/6283633.html

People vs. chemical plant (2008). Journal. ‘Retrieved from’ http://www.china.org.cn/english/environment/239503.htm

PLA. (2002). Full text of China's defense white paper in 2002. Retrieved 18/10/07. from http://news.xinhuanet.com/english/2002-12/10/content_654851.htm.

Pollution costs equal 10% of China's GDP. (2006). Journal. ‘Retrieved from’ http://www.chinadaily.com.cn/china/2006-06/06/content_609350.htm

Powell, G. (2007, April 25th, 2007 ). The Internet must clean up its act in China. Retrieved 17/07/07, 2007, from

Sniffer Packets & Firewalls 193

http://www.chinaeconomicreview.com/it/2007/04/25/the-internet-must-clean-up-its-act-in-china/

Premier Wen revisits AIDS-suffering villages (2007). Journal, (2007-12-01 ). ‘Retrieved from’ http://www.chinadaily.com.cn/china/2007-12/01/content_6292466_2.htm

Premier Wen tells Merkel China opposes hackers. (2007). Journal, (2007-08-28 11:17:45). ‘Retrieved from’ http://www.chinavoc.com.cn/NewsCenter/ShowArticle.aspx?Id=11523

The President's State of the Union Address (2002, 9:15 P.M. EST). Retrieved 20 June 2007, 2007, from http://www.whitehouse.gov/news/releases/2002/01/20020129-11.html

President promises divergent voices be heard online. (2008, 21/06/08). Online. Retrieved June 21, 2008, from http://www.china.org.cn/government/focus_news/2008-06/21/content_15865804.htm

Procházka, M. (2006). Introduction to the Sub-Project activities and research themes. Journal. ‘Retrieved from’ http://www2.lingue.unibo.it/Acume/sb/Introduction_prochazka.htm

Qiang, X. (2004). The words you never see in Chinese cyberspace163Journal, (2004-08-30, 10:37 PM). ‘Retrieved from’

http://chinadigitaltimes.net/2004/08/the_words_you_n.phpQiang, X. (2006). Image of Internet police: JingJing and Chacha online - Hong Yan

(洪燕). Journal. ‘Retrieved from’ http://chinadigitaltimes.net/2006/01/image_of_internet_police_jingjing_and_chacha_online_hon.php

Qing, H. (2006). Blogs provide platform to air different opinions. Journal. ‘Retrieved from’ http://www.chinadaily.com.cn/english/doc/2006-03/09/content_528896.htm

Ramirez, L. (2006). Pollution a Major Source of Discontent in China; Government Lacks Comprehensive Strategy. Journal, (08 May 200608 ). ‘Retrieved from’ http://www.voanews.com/english/archive/2006-05/2006-05-08-voa23.cfm

Report: unsafe sex major cause of HIV infection. (2007). Journal. ‘Retrieved from’ http://news.xinhuanet.com/english/2007-08/20/content_6566946.htm

Riemens, P. (2002). SOME THOUGHTS ON THE IDEA OF "HACKER CULTURE". Multitudes, 2(8).

Road of free information flow cautious but resolute (2007). Journal. ‘Retrieved from’ http://www.chinadaily.com.cn/china/2007-11/08/content_6240752.htm

Road of free information flow cautious but resolute. (2007). Journal. ‘Retrieved from’ http://www.chinadaily.com.cn/china/2007-11/08/content_6240752.htm

Rodan, G. (2003). Embracing electronic media but suppressing civil society: authoritarian consolidation in Singapore. The Pacific Review, 16(4), 503-524.

Rogin, J. (2007, 13/02/2007). Cyber officials: Chinese hackers attack 'anything and everything' February 13, 2007. 2007, from http://www.fcw.com/online/news/97658-1.html?page=2

Rosenberg, T. (2006). SEED INTERVIEW: WAN YANHAI. Journal, (JAN/FEB 2003). ‘Retrieved from’ http://seedmagazine.com/news/2006/08/seed_interview_wan_yanhai.php

Ruffin, O. (2004, March 28, 2004). Hacktivism, From Here To There. Paper presented at the CyberCrime and Digital Law Enforcement Conference., Yale Law School.

Sniffer Packets & Firewalls 194

School Blast Parents in China Furious Complaints Went Unheard. (2001, March 8, 2001). March 8, 2001. Retrieved 07/06/2001, 2001, from http://www.insidechina.com/news.php3?id=304742&brief=text

School Explosion Aftermath in Jiangxi Well Handled. (2001, Friday, March 09, 2001, updated at 10:07(GMT+8)). Friday, March 09, 2001, updated at 10:07(GMT+8). Retrieved 07/06/2001, 2001, from http://english.peopledaily.com.cn/200103/09/eng20010309_64548.html

Sevastopuloin, D., & McGregor, R. (2007, Sep 04, 2007). China 'hacked' into Pentagon defence system, p. 1, from http://search.ft.com/ftArticle?queryText=hacking+china&aje=true&id=070904000597&ct=0&nclick_check=1

Shanxi governor criticizes publicity officials for handling of media during forced labor scandal (2007). Journal, (June 27, 2007). ‘Retrieved from’ http://english.people.com.cn/200706/27/eng20070627_388133.html

Shanxi governor makes self-criticism for slave labor. (2007). Journal. ‘Retrieved from’ http://www.chinadaily.com.cn/china/2007-06/21/content_898823.htm

Shoesmith, B. (1998). No Sex! No Violence! No News! Satellite and Cable Television in China. Media Asia, Volume 25(Number 1).

SMS Texts Energize a Chinese Protest (2007). Journal. ‘Retrieved from’ http://www.asiasentinel.com/index.php?option=com_content&task=view&id=520&Itemid=31

Sohmen, P. (2001). Taming the Dragon: China’s Efforts to Regulate the Internet. Standford Journal of East Asian Affairs 1(Spring), 17 - 26.

Somerlad, E. L. (1981). Communication in the New China. Media Asia.Song, H., LinliCheng. (2006). Digital Divide New Rules on Internet News

Information. China Law & Practice, (2005, December/ January 2006). 18-20.Soong, R. (2006, July 7, 2006). Red Rubber Ball. Retrieved 5/09/07, 2007, from

http://zonaeuropa.com/20060709_1.htmSoong, R. (2007, 08/24/2007). Has World of Warcraft Been Harmonized? .

Retrieved 08/24/2007, 2007, from http://zonaeuropa.com/200706.brief.htm#101

Southerland, D. (2007). China's Media Controls: Could Bloggers Make a Difference? Journal, 2(8). ‘Retrieved from’ http://jamestown.org/china_brief/article.php?articleid=2373334

"A Special Message of Hope". (2001). Journal, (July 4th, 2001). ‘Retrieved from’ http://www.cultdeadcow.com/cDc_files/declaration.html

Starbucks Cafe in Forbidden City Under Fire (2000). Journal. ‘Retrieved from’ http://english.people.com.cn/english/200011/24/eng20001124_56044.html

Starbucks should be verboten in Forbidden City, say netizens. (2007). Journal. ‘Retrieved from’ http://english.people.com.cn/200701/18/eng20070118_342364.html

State Council approves new rules on Net content, telecom. (2000). Retrieved 2000, 2000, from http://www.chinaonline.com/topstories/000920/1/C00092019.asp

State Security Protection Regulations for Computer Information Systems On the Internet. (2000). January 1 2000. 2000, from http:www.chinaonline.com

Sun, C., & Tian, X. (2007). Gao Yaojie: A Doctor with Conscience. Journal, (March/April 2007 ). ‘Retrieved from’ http://www.chinamemo.org/chinascope/magazine/20070304/3

Sniffer Packets & Firewalls 195

Sun, W. (1996). In search of new frameworks Issues in the study of Chinese Media in the era of Reform. Media International Australia(February Number 79), 40-48.

Sun, Y. (2007a). Draft emergency response law bans false information on accidents. Journal. ‘Retrieved from’ http://news.xinhuanet.com/english/2007-06/24/content_6284373.htm

Sun, Y. (2007b, 2007-07-10 16:06:06). Lawyers call for "slavery" to be added to Chinese criminal law Retrieved 2007-07-10 2007, from http://news.xinhuanet.com/english/2007-07/10/content_6354435.htm

Support for new holiday plan may depend on wording of polls. (2007). Journal. ‘Retrieved from’ http://english.people.com.cn/90001/90776/90882/6301600.html

Tai, Z. (2006). The Internet in China Cyberspace and Civil Society. New York: Routledge.

Taiwan asks China to help track hackers. (2003). Journal, (WEDNESDAY, SEPTEMBER 24, 2003 11:53:17 AM). ‘Retrieved from’ http://www.infowar-monitor.net/modules.php?op=modload&name=News&file=article&sid=612&mode=thread&order=0&thold=0

Taiwan downplays China TV hacking. (2002). Journal, (Wednesday, September 25, 2002 Posted: 12:37 PM EDT (1637 GMT)). ‘Retrieved from’ http://archives.cnn.com/2002/WORLD/asiapcf/east/09/25/taiwan.falungong/

Tan, Z. A., & Foster, W. (1998). Internet Diffusion in Peoples Republic of China. March 1998. 1999, from http://www.//china.sry.edu//chinainternet0398.pdf

Tan, Z. A., Foster, W., & Gordon, S. (1997). China's New Internet Regulations: Two Steps Forward, One Step Back. Communications of the ACM, 40 Number 12(December), 11-16.

Tan, Z. A., Foster, W., & Gordon, S. (1999). China's state co-ordinated Internet infrastructure. Communication of the ACM, 42(6), 44-52.

Tan, Z. A., & Wu, O. (2002). Globalization and E-commerce I: Factors Affecting E-commerce Diffusion in China. Communications of the Association for Information Systems, 10, 4-32.

Taubman, G. (1998). Tuesday Not-So Worldwide Web: The Internet in China, and the Challenges to Nondemocratic Rule. Political Communication, 15, 255 - 272,.

Taylor, R. (2006). China Game Wars Journal. ‘Retrieved from’ http://www.bbcworld.com/content/clickonline_archive_14_2006.asp?pageid=665&co_...

Taylor, T. L. (2006). Does WoW Change Everything?: How a PvP Server, Multinational Player Base, and Surveillance Mod Scene Caused Me Pause. Games and Culture, 1(4).

Thomas, T. L. (2005). Chinese and American network warfare. Joint Force Quarterly..

FindArticles.com. 18 Oct. 2007. (July 2005).Thomson, I. (2007). US blames China for Pentagon hackPeople's Liberation Army responsible, say officials

Journal, (04 Sep 2007). ‘Retrieved from’ http://www.computing.co.uk/vnunet/news/2197972/chinese-hackers-attack-pentagon

Tibetans allege cyber invasion. (2004). Journal, (29 Jan 2004, 1801 hrs IST,IANS ). ‘Retrieved from’ http://timesofindia.indiatimes.com/articleshow/453079.cms

Sniffer Packets & Firewalls 196

Trojan horse (Publication. (2006). Retrieved 17/10/07, from SearchSecurity.com http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213221,00.html

Truth About Jiangxi School Building Collapse Known. (2001, Friday, March 09, 2001, updated at 16:23(GMT+8)). Friday, March 09, 2001, updated at 16:23(GMT+8). Retrieved 07/060/2001, 2001, from http://english.peopledaily.com.cn/200103/09/eng20010309_64546.html

Tyson, J. (2006). How Carnivore Worked. from http://computer.howstuffworks.com/carnivore.htm

Unger, J., & Chan, A. (1995). China Corporatism and the East Asia Model. The Australian Journal of Chinese Affairs, 33(January), 29-53.

Virilio, P. (1995). Speed and Information: Cyberspace Alarm! ctheory.net.Virus attacks on Tibetan network; Chinese blamed. (2003). Journal, (Friday October

31, 2003). ‘Retrieved from’ http://www.infowar-monitor.net/modules.php?op=modload&name=News&file=article&sid=728&mode=thread&order=0&thold=0

Wacker, G. (2003). The Internet and Censorship in China. In C. R. a. G. W. Huges (Ed.), China and the Internet: Politics of the digital leap forward. New York: Routledge Curzon.

Walton, G. (2001). China's Golden Shield Corporations and the Development of Surveillance Technology in the Peoples Republic of China: International Centre for Human Rights and Democratic Development.

Wang, H. (2007). HIV/AIDS cases on rise in China Journal. ‘Retrieved from’ http://news.xinhuanet.com/english/2007-09/08/content_6687991.htm

Wang, S. (2007, 08/30/2007). Govt bloggers' followers just a clique away. China Daily, p. 12, from http://www.chinadaily.com.cn/cndy/2007-08/30/content_6066927.htm

Wang, Z. (2007). Domestic Media Partnership Urged for AIDS Awareness Journal, ( August 22, 2007). ‘Retrieved from’ http://www.china.org.cn/english/health/221744.htm

Web media challenge governmental spokesmen (2008). Journal. ‘Retrieved from’ http://www.china.org.cn/english/government/240634.htm

Wei Li, & Tao, D. Y. (2005). The Great Leap Forward: Anatomy of a Central Planning Disaster. Journal of Political Economy, 113(4), 840.

Welcome to Technorati. (2007, 30/8/07). Retrieved 31/8/07, 2007, from http://technorati.com/about/

What is civil society? (2004). Journal, 2007(1/11/07). ‘Retrieved from’ http://www.lse.ac.uk/collections/CCS/introduction.htm

Wu, G. (2000). One Head, Many Mouths: Diversifying Press Structures in Reform China. In C. C. Lee (Ed.), Power, Money and Media Communication Patterns and Bureaucratic Control in Cultural China. Evanston:: Northwestern University Press.

Wu, X. (2002). Doing PR in China: A 2001 Version-Concepts, Practices and Some Misconceptions Public Relations Quarterly, 47( 2), 10-18.

Wu, X. (2005). Red Net over China: China’s New Online Media Order and its Implications

Asian Journal of Communication, 15( 2 July 2005), 215-227.Wu, X. (2006). Chinese Cyber Nationalism: evolution characteristics and

implications. Plymouth: Lexington Books.Xin, Q. (2005). China curbs civil society groups Journal, (Apr 19, 2005). ‘Retrieved

from’ http://www.atimes.com/atimes/China/GD19Ad07.html

Sniffer Packets & Firewalls 197

Xinhua. (2007, 18 June 2007). Brick kiln slavery scandal demonstrates poor governance. People's Daily Online English, from http://english.peopledaily.com.cn/200706/18/eng20070618_385386.html

Yan, Z. (2006). China's cyber police curbs online crimes. Journal. ‘Retrieved from’ http://news3.xinhuanet.com/english/2006-05/15/content_4549226.htm

Yang, G. (2002). Between Democracy and Development:The Impact of New Information Technologies On Civil Society in China. Retrieved 2/11/07, 2007, from http://programs.ssrc.org/itic/publications/civsocandgov/yangpolicyrevised.pdf

Yang, G. (2003a). The Co-Evolution of the Internet and Civil Society in China. Asian Survey,, 43(3), 405-422.

Yang, G. (2003b). The Internet and Civil society in China: a preliminary assessment. Journal of contemporary China, 12(36), 453-475.

Yang, G., & Calhoun, C. (2007). Media, Civil Society, and the Rise of a Green Public Sphere in China. China Information XX(2), 211-236.

Yardley, J. (2005). Rural Chinese Riot as Police Try to Halt Pollution Protest. Journal, (

April 14, 2005). ‘Retrieved from’ http://www.nytimes.com/2005/04/14/international/asia/14riot.html

Yardley, J. (2007). China Covers Up Detention of AIDS Doctor. The New York Times, from http://www.nytimes.com/2007/02/16/world/asia/16china.html?_r=1&pagewanted=print&oref=slogin

Yoshihara, T. (2001). CHINESE INFORMATION WARFARE: A PHANTOM MENACE OR EMERGING THREAT? Retrieved 18/10/07. from http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?PubID=62.

Zhang, D. (2007). Can a Computer Virus be “Patriotic”? . Journal. ‘Retrieved from’ http://chinadigitaltimes.net/2007/10/can_computer_virus_be_patriotic.php

Zhang, M. (1997, November 15 1997). China issues new rules strengthening regulatory structure over Internet. East Asian Executive Reports, 19, 9-12.

Zhang, R. (2007, 8/9/07). Time Limit Penalties Now Mandatory for Online Games. Chinanews.cn, China.org.cn by from http://www.china.org.cn/english/entertainment/217375.htm

Zhang, T. (2007). Grassroots NGOs Struggle for Legitimacy. Journal, 2007(2/22/07). ‘Retrieved from’ http://www.china.org.cn/english/environment/214835.htm

Zhao, M. (2007). Why I Gagged the Karamay Fire Story - Yang Weiguang (杨伟光). Journal. ‘Retrieved

Zheng, Y. (2008). Technological Empowerment The Internet, State and Society in China. Stnadford: Standford University Press.

Zhou, Y. (2005). Informed Nationalism: military websites in Chinese cyberspace. Journal of Contemporary China, 14(44), 543 - 562.

Zhou, Y. (2006). Hitoricizing Online Politics Telegraphy, The Internet and Political Particpation in China. Standford: Standford University Press.

Zhou, Y. (2007, 2007-06-18 17:42:30 ). Commentry: Brick kiln slavery scandal demonstrates poor governance. Retrieved 2007-06-18 2007, from http://news.xinhuanet.com/english/2007-06/18/content_6258515.htm

Sniffer Packets & Firewalls 198

ABBREVIATIONS

APEC Asia Pacific Economic Co Operation

BBS Bulletin Board

BSB Blog Service Provider

CCP Chinese Communist Party

cDc Cult of the Dead Cow

CNA Computer network attacks

CNNIC China Internet Network Information Center

CCLY Communist Youth League

FoN Friends of Nature

ICP Internet Content Provider

IO Information operations

ONI Open Networks Initiative

INEW Integrated network-electronic warfare

ISP Internet Service Provider

IW Information warfare

MII Ministry of Information Industry

MPS Ministry of Public Security

MMOG Massive Massively multiplayer online game

MMORPGs Massively Multiplayer Online Role-Playing Games

MSS Ministry of State Security

NCW Network-centric warfare

NGO Non Government Organization

NPO Non Profit Organization

PRC Peoples Republic of China

PSB Public Security Bureau

SCIO State Council Information Office

SOE State Owned Enterprises

RSS Feed RSS is a means of updating and distributing content in a variety

of ways such as blog entries news headlines, or podcasts.

WWW World Wide Web

Sniffer Packets & Firewalls 199

APPENDIX I

Time Line

1987

The first network in China developed.

1993

Institute for High-Energy Physics (IHEP) connects to the Internet.

1995

Development in the World Wide Web facilitates global interest in the Internet, as well

as China. First BBS board.

1996

In February the State Council issues the “Interim Regulation on International

Interconnection of Computer Information Networks in the PRC”.

1997

The “Interim Regulation on International Interconnection of Computer Information

Networks in the PRC” is updated in May.

CNNIC releases its first report, and puts the number of users at 620,000 and the

number of Chinese websites at 15,000.

1998

The Ministry of Information Industry is established.

The number of uses reaches 1.175 million, and the number of Chinese websites is

37,000.

1999

May 7: NATO bombs the Chinese Embassy in Belgrade.

September 14: Wu Jichuan head of the MII reiterates that foreign investment is not

allowed in China’s Internet sector.

September 15: Gunagming Daily raises concerns over news content on Internet

Portals and Websites, but also argues that traditional media should shift their function

Sniffer Packets & Firewalls 200

from propaganda to a reporting function.

September 25: Guangming Ribao runs story critical of the news coverage and

potential of Portals in China.

November 30: economist Zhou Qiren argues that foreign investment should be

allowed in ISP and ICP. This story appears in the China Business Times.

2000

January 1: Secrecy Regulations introduced.

January 2: Beijing Qingnian Ribao calls for Internet café to be regulated.

January 31: New encryption rules take effect

February 2: The Legal Daily calls for the establishment of laws to control online

information, define online services responsibilities, e-commerce, and consumer

protection

February 3: Hua Sheng Overseas Chinese Newspaper reports that the State Council

will provide funding for Sate owned media websites. Xinhua, China Daily, Peoples

Daily, State Council News Office (china.org.cn), China International Broadcast

Station (cnradio.com).

February 7: State Council approves funding for official news websites, China Daily

Renmin Ribao, Xinhua Sate council News Office, China International Broadcast

Service.

February 15: Wang Qingcun Deputy bureau chief of the State Council News Office

calls for rules to guide news dissemination on the Internet and he announces that

commercial website are allowed to carry news from traditional media and that new

commercial websites must get approval from the relevant government departments

(ChinaEconomicTimes, 2000).

March 2: A spokes person from the Sate Council News Office Network Division

Sniffer Packets & Firewalls 201

announces that restrictions on the financing for traditional news websites will be

loosened. This appears in a lengthy article in the Financial Times and outlines the fear

that official news website will be overwhelmed by commercial websites.

March 3: CCIDnet is launched, claiming to be China’s largest technology and

information portal and is the Centre of Computer and Microelectronics Industry

Development, the development arm of MII.

March 7: www.21DNN website launched by 21 Dragon News Network. This is the

first official news website, and made up of nine major media organizations from

Beijing. Beijing Ribao, Beijing Qingnian Ribao Beijing Economic Daily, Beijing

Evening News, Beijing Peoples Broadcasting Station, Beijing Cable Broadcasting

Station, Beijing Broadcast and TV Weekly, and the Beijing Morning Post.

March 14: The State Council Information Office announces funding for the building

of five of the major central media organizations. The five are the Peoples Daily, China

Daily, China Radio International, the China Internet Information Centre and Xinhua.

The last two share an extensive website

March 15: Government announces regulations for Internet café. Internet café must

get approval form the Administration of Industry and Commerce and the Public

Security Bureau and they must establish reliable security systems.

March 22: “Circular on Further Strengthening the Management of Reprints by

Newspapers and Periodicals” issued by the State Press and Publication

Administration. This circular demands that these news organizations be more

accountable.

March: announcement made for new ISP regulations to be ready by the end of March.

April: Internet Information Management Bureau set up under the State Council

Information Office, headed by Zhao Qizheng. Zhao has close ties to Jiang Zemin that

date back to Shanghai.

Sniffer Packets & Firewalls 202

April 17: The Internet Propaganda Administrative Bureau is established and is

responsible for “guiding and coordinating Chinese web sites and news content. The

director of the bureau is Wang Qingcun. (ChinaOnline, 2000b)

April 24: Wang Qingcun, Bureau Chief of the Internet Information Management

Bureau tells China Online that “China’s ICP’s may soon be allowed to have their own

news reports and release information, so long as they abide by Chinese laws and

regulations.

April 25: The Peoples Dailly Renmin Ribao announces Commercial Websites Given

No Right for News Coverage

May: Shanghai Orient Network Information Centre receives permission from the

SCIO to put news on its website. Ten of Shanghai’s most influential media

organizations have shares in this website. This includes Jiefang Ribao (Liberation

Daily), Shanghai Qingnian Bao (Shanghai Youth Daily) and radio and television

stations.

May 11: Qinghua University establishes an Internet content laboratory to study

Internet content and to give advice to news Websites.

June 19: Shanghai hosts Online Journalism Seminar.

June: In an interview with the US magazine Science, President Jiang Zemin called for

“China’s web surfers to be protected from distorted facts”, He said “One thing must

be ensure: that facts should not be distorted. And I think this should also apply to the

Internet.” (PeoplesDaily, 2000a) This interview is recounted in the Peoples Daily.

June 20: Peoples Daily announces the drafting of Internet copyright laws to protect

literary works from piracy.

Sniffer Packets & Firewalls 203

July: Jiang talks to 60 Minutes in the USA and reiterates his earlier comments about

the Internet.

August 9: Editorial in the Peoples Daily stating that both Jiang Zemin and Li Peng

view the Peoples Daily Renmin Rebao on line every day.

September: New Telecom and Internet Regulations released.

October 10: Five Year Plan released with a focus on agriculture and technology, this

includes the Internet.

November 6: Provisional Regulations of Internet News Releasing issued

December 28 Resolution on maintaining the security of computer networks passed by

the 19th session of the Ninth National Peoples Congress.

2001

January: CNNIC puts the number of Internet users at 22.5 million.

March: A school in Jiangxi Province explodes. Chatrooms were closed down after

parents of the victims posted messages that blamed the government for the incident.

April: Spy Plane crash. The war of words extended into cyberspace as hackers in the

USA and the PPC launched a virtual war, disabling official sites and planting flags

and slogans.

July: The Nandan mine disaster. News of the Nandan mine spread across the web and

reached Beijing despite the efforts of local officials to prevent news of the disaster

from leaking out.

2002

March: The ABC’s website is suddenly blocked and then unblocked after negotiations

with Embassy Staff.

May: The Washington Post and other foreign Websites suddenly unblocked.

Sniffer Packets & Firewalls 204

Representatives from over 100 Internet businesses signed a pledge to promote self-

discipline in the industry.

September: Google is found to be blocking sites in China, and France.

October: Falun Gong hacks into television satellites and cable television and transmits

messages.

November: 16th Party Congress held in Beijing. Jiang Zemin own and Hu Jintao as his

successor.

December: Cyber dissident, Li Zhi is sentenced to eight years in prison for

subversion. Yahoo is accused of providing information on Li’s account.

November: The Golden Shield Project is launched, with the aim of enhancing

surveillance capabilities, through the integration of online databases, and Internet

surveillance.

2004

November: Falun Gong hijacks the AsiaSat satellite from Hong Kong and transmits

Falun Gong messages.

2005

September: The Administrative Regulations of Internet News Information Service are

issued by the State Council’s Information Office and the Ministry of Information

Industry.

2006

January: CNNIC puts the number of Internet users at 111 million, 64.4% of those

users have access through broadband.

Sniffer Packets & Firewalls 205

Freezing Point a weekly supplement of the state-run China Youth Daily is banned

following the publishing of an article criticizing the countries official history text

books.

In the United States of America the Congressional Human Rights Caucus accuses

Google, Microsoft, Cisco and Yahoo of collaborating with Chinese authorities to

censor the Internet.

2007

The Black Kiln Incident exposed slavery rackets in Shandong and Hubei provinces

when a group of 400 fathers posted a letter looking for the children on a website.

Novemeber: The civil society journal Minjian was closed along with the online non-

profit journal China Development Brief. Both journals are attached to the NGO sector

and appear to be caught up in a crackdown on NGO activities.

Yahoo settled a lawsuit with a Chinese journalist Shi Tao and cyber dissident Wang

Xiaoning. The lawsuit was launched by the World Organization for Human Rights

USA on behalf of both the activists.

Sniffer Packets & Firewalls 206

Appendix II

Entities Involved in Internet Regulation in China

• Central Propaganda Department

• Department of Commerce

• Department of Telecommunications

• General Administration of Press and Publications

• Ministry of Culture

• Ministry of Information Industry

• Ministry of Public Security

• Public Security Bureau

• State Administration of Radio, Film, and Television

• State Council

• State Council Information Agency

• State Secrets Bureau

Sniffer Packets & Firewalls 207

Appendix III

Chapter II. Security Mechanism Articles 8, 9, 10, & 11 deals with Bulletin Boards and Chat Rooms:

Article 8. The management of secrets concerning information on the Internet shall be based on the principle of "whoever places materials on the Internet takes the responsibility." Information provided to or released on Web sites must undergo a security inspection and approval, which shall include departmental management. Related units shall, in line with state laws and regulations on guarding secrets, establish and improve a leadership responsibility system for the examination and approval of information intended for the Internet. Units that provide the information shall establish a security system for information examination and approval in accordance with certain work procedures.

Article 9. As for information collected for the purpose of Internet information services, not including what has been published by other news media, organizers shall obtain the approval of the units providing the information before releasing it on the Internet. Any expansion or updating of information on the Internet shall adhere strictly to the security system for information examination and approval.

Article 10. Units and users that establish a BBS chat room or network news group shall be verified and approved by the relevant organizations to clarify the requirements and responsibilities concerning the protection of secrets. No unit or individual shall release, discuss or disseminate information about state secrets on a BBS, chat room or network news group.

For BBS, chat rooms or network news groups that are open to the public, the organizer or its high-level competent department shall strictly carry out its responsibilities concerning the protection of secrets, establish a complete management system and strengthen supervision and inspection. If it discovers leaked information, it shall take timely measures and report this to the local authorities for the protection of secrets.

Article 11. Users who exchange information on the Web via email shall abide by regulations concerning the guarding of state secrets. They shall not deliver, forward or copy information concerning state secrets via email. National backbone networks and Internet access providers shall clarify to their email users their requirements for protecting secrets and shall improve their management systems("State Security Protection Regulations for Computer Information Systems On the Internet," 2000)).

Sniffer Packets & Firewalls 208

Appendix IV

5. blog service should obey Chinese laws and regulations, protect the legal rights of

blog users and the public

6. a good blog service needs:

(1) comprehensive management

(2) sufficient technical and content management staff

(3) sufficient data security measures, including user data privacy, blog content

security

(4) obey all other existing laws

7. provide good creative environment for users guide them to create excellent cultural

works

8. blog service provider should have user agreement with user, and blog host has a

right not to give service to those who refuse to terms of service

9. terms of service should include:

(1) blogger agrees to abide by china’s laws, regulations, etc, will use the web in a

civilized manner, not disseminate pornography,

or illegal information

(2) blogger agrees not to denigrate and other ethnicities and religions

(3) blogger agrees not to disseminate rumours and false information, or information

that harms others or violates the legal rights of others

(4) blogger agrees not to disseminate information that violates the copyrights of others

(5) blogger agrees to monitor and manage postings, and to delete postings that are

illegal or bad

(6) blogger wont use blog to disseminate viruses or other things that would harm other

people’s computers

10. if blogger doesnt adhere to the terms, the service provider has a right to delete any

illegal or bad information, or terminate the blogger’s service

11. encourage blogger to use real name, and register real full name, contact address,

phone number etc.

12. blog service will use proper security to manage the information of bloggers who

use their real names, protect the user private data, and not give it to third parties or

publicize it without the blogger’s permission except under circumstances when law

requires.

Sniffer Packets & Firewalls 209

13. blog service should reserve the right to manage the bloggers postings, and the

blogger should manage their postings and delete illegal or inappropriate information.

14. blog service should establish online customer service window, and set up a

hotline, to accept public comments and complaints about the blog service and content,

and resolve things in a timely manner

Sniffer Packets & Firewalls 210

Appendix V

The following list of banned words was published by the China Digital Times.

From Program Files\Tencent\QQGame\COMToolKit.dll:

bitch

shit

falun

sex

tianwang

cdjp

av

bignews

boxun

chinaliberal

chinamz

chinesenewsnet

cnd

creaders

dafa

dajiyuan

dfdz

dpp

falu

falun

falundafa

flg

freechina

freedom

freenet

fuck

GCD

gcd

hongzhi

hrichina

huanet

hypermart

incest

jiangdongriji

lihongzhi

making

minghui

minghuinews

nacb

naive

nmis

paper

peacehall

playboy

renminbao

renmingbao

rfa

safeweb

sex

simple

svdc

taip

tibetalk

triangle

triangleboy

UltraSurf

unixbox

ustibet

VOA

VOA chinese

wangce

wstaiji

xinsheng

Sniffer Packets & Firewalls 211

yuming

zhengjian

zhengjianwang

zhenshanren

zhuanfalun

bitch

fuck

shit

Sniffer Packets & Firewalls 212

三个代表|表 一党|党 多党|党 民主|民 专政|政 行房|房 自慰|慰 吹萧|萧 色狼|色 胸罩|罩 内裤|裤 底裤|裤 私处|私 爽死|爽 变态|态 妹疼|疼 妹痛|痛 弟疼|疼 弟痛|痛 姐疼|疼姐痛|痛 哥疼|疼 哥痛|痛 同房|房 打炮|炮 造爱|爱 性交|性 性爱|性 作爱|作 做爱|做

操你|操 日你|日 日批|日 日逼|日 鸡巴|鸡 我操|操 操死|操 乳房|乳 阴茎|阴 阳具|阳 开

苞|苞 肛门|肛 阴道|阴 阴蒂|阴 肉棍|肉 肉棒|肉 肉洞|肉 荡妇|荡 阴囊|阴 睾丸|睾 捅你

|捅 捅我|捅 插我|插 插你|插 插她|插 插他|插 干你|干 干她|干 干他|干 妓女|妓 射精|射 口交|交 手淫|淫 口淫|淫 屁眼|屁 阴户|阴 阴门|阴 下体|下 龟头|龟 阴毛|阴 避孕套|套 你妈逼|逼 大鸡巴|鸡 性高潮|性 性虐待|性 性高潮|性 大法|法 弟子|弟 大纪元|元 真

善忍|忍 明慧|慧 大法|法 洪志|志 红志|志 洪智|智 红智|智 法轮|轮 法论|论 法沦|沦 法

伦|伦 发轮|轮 发论|论 发沦|沦 发伦|伦 轮功|功 轮公|公 轮攻|攻 沦功|功 沦公|公 沦攻

|攻 论攻|攻 论功|功 论公|公 伦攻|攻 伦功|功 伦公|公 打倒|倒 民运|运 六四|四 台独|独 王丹|丹 柴玲|柴 李鹏|鹏 天安门|安 江泽民|泽 朱容基|基 朱镕基|朱 李长春|春 李瑞

环|瑞 胡锦涛|锦 魏京生|魏 台湾独立|湾 藏独|藏 西藏独立|藏 疆独|疆 新疆独立|疆 警察

|察 民警|警 公安|公 邓小平|邓 嫖|嫖 大盖帽|帽 革命|命 武警|警 黑社会|社 交警|警 消

防队|消 刑警|刑 夜总会|夜 妈个|个 公款|款 首长|首 书记|记 坐台|台 腐败|腐 城管|管

暴动|暴 暴乱|乱 李远哲|哲 司法警官|司 高干|高 高干子弟|弟 高干子女|女 人大|大 尉健

行|健 李岚清|清 黄丽满|满 于幼军|军 文字狱|狱 宋祖英|英 天安门|门 自焚|焚 骗局|骗

猫肉|猫 吸储|储 张五常|张 张丕林|丕 空难|难 温家宝|温 吴邦国|邦 曾庆红|庆 黄菊|黄

罗干|罗 吴官正|官 贾庆林|庆 专制|制 卖淫|淫 三個代表|表 一黨|黨 多黨|黨 民主|民 專

政|政 行房|房 自慰|慰 吹蕭|蕭 色狼|色 胸罩|罩 內褲|褲 底褲|褲 私處|私 爽死|爽 變態

|態 妹疼|疼 妹痛|痛 弟疼|疼 弟痛|痛 姐疼|疼 姐痛|痛 哥疼|疼 哥痛|痛 同房|房 打炮|炮 造愛|愛 性交|性 性愛|性 作愛|作 做愛|做 操你|操 日你|日 日批|日 日逼|日 雞巴|雞我操|操 操死|操 乳房|乳 陰莖|陰 陽具|陽 開苞|苞 肛門|肛 陰道|陰 陰蒂|陰 肉棍|肉

肉棒|肉 肉洞|肉 蕩婦|蕩 陰囊|陰 睾丸|睾 捅你|捅 捅我|捅 插我|插 插你|插 插她|插 插

他|插 幹你|幹 幹她|幹 幹他|幹 妓女|妓 射精|射 口交|交 屁眼|屁 陰戶|陰 陰門|陰 下體

|下 龜頭|龜 陰毛|陰 避孕套|套 你媽逼|逼 大雞巴|雞 性高潮|性 性虐待|性 性高潮|性 大

法|法 弟子|弟 大紀元|元 真善忍|忍 明慧|慧 大法|法 洪志|志 紅志|志 洪智|智 紅智|智

法輪|輪 法論|論 法淪|淪 法倫|倫 發輪|輪 發論|論 發淪|淪 發倫|倫 輪功|功 輪公|公 輪

攻|攻 淪功|功 淪公|公 淪攻|攻 論攻|攻 論功|功 論公|公 倫攻|攻 倫功|功 倫公|公 打倒

|倒 民運\|運\ 六四|四 台獨|獨 王丹|丹 柴玲|柴 李鵬|鵬 天安門|安 江澤民|澤 朱容基|基朱鎔基|朱 李長春|春 李瑞環|瑞 胡錦\濤|錦\ 魏京生|魏 臺灣獨立|灣 藏獨|藏 西藏獨立|藏 疆獨|疆 新疆獨立|疆 警察|察 民警|警 公安|公 鄧小平|鄧 嫖|嫖 大蓋帽|帽 革命|命

武警|警 黑社會|社 交警|警 消防隊|消 刑警|刑 夜總會|夜 媽個|個 公款|款 首長|首 書記

|記 坐台|台 腐敗|腐 城管|管 暴動|暴 暴亂|亂 李遠哲|哲 司法警官|司 高幹|高 高幹子弟

|弟 高幹子女|女 人大|大 尉健行|健 李嵐清|清 黃麗滿|滿 於幼軍|軍 文字獄|獄 天安門|門 自焚|焚 騙局|騙 貓肉|貓 吸儲|儲 張五常|張 張丕林|丕 空難|難 溫家寶|溫 吳邦國|邦曾慶紅|慶 黃菊|黃 羅幹|羅 賈慶林|慶 專制|制 賣淫|淫 八九|八 八老|八 巴赫|巴 白立

朴|白 白梦|白 白皮书|白 保钓|保 鲍戈|鲍 鲍彤|鲍 暴乱|暴 暴政|暴 北大三角地论坛|北

北韩|北 北京当局|北 北京之春|北 北美自由论坛|北 博讯|博 蔡崇国|蔡 藏独|藏 曹长青|曹曹刚川|曹 柴玲|柴 常劲|常 陈炳基|陈 陈军|陈 陈蒙|陈 陈破空|陈 陈希同|陈 陈小同|陈陈宣良|陈 陈一谘|陈 陈总统|陈 程凯|程 程铁军|程 程真|程 迟浩田|迟 持不同政见|持

赤匪|赤 赤化|赤 春夏自由论坛|春 达赖|达 大参考|大 大法|大 大纪元|大 大纪元新闻网|大大纪园|大 大家论坛|大 大史|大 大史记|大 大史纪|大 大中国论坛|大 大中华论坛|大 大

众真人真事|大 戴相龙|戴 弹劾|弹 登辉|登 邓笑贫|邓 迪里夏提|迪 地下教会|地 地下刊物|地 弟子|弟 第四代|第 电视流氓|电 钓鱼岛|钓 丁关根|丁 丁元|丁 丁子霖|丁 东北独立|东东方红时空|东 东方时空|东 东南西北论谈|东 东社|东 东土耳其斯坦|东 东西南北论坛|东动乱|动 独裁|独 独裁政治|独 独夫|独 独立台湾会|独 杜智富|杜 多维|多 屙民|屙 俄国|俄 发愣|发 发轮|发 发正念|发 法愣|法 法抡|法 法仑|法 法伦|法 法轮|法 法论|法 法十

轮十功|法 法十轮十功|法 法谪|法 法谪功|法 反封锁技术|反 反腐败论坛|反 反攻|反 反共|反 反人类|反 反社会|反 方励之|方 方舟子|方 飞扬论坛|飞 斐得勒|斐 费良勇|费 分家在|分 分裂|分 粉饰太平|粉 风雨神州|风 风雨神州论坛|风 封从德|封 封杀|封 冯东海|冯 冯

素英|冯 佛展千手法|佛 付申奇|付 傅申奇|傅 傅志寰|傅 高官|高 高文谦|高 高薪养廉|高

高瞻|高 高自联|高 戈扬|戈 鸽派|鸽 歌功颂德|歌 蛤蟆|蛤 个人崇拜|个 工自联|工 功法|

Sniffer Packets & Firewalls 213

功 共产|共 共党|共 共匪|共 共狗|共 共军|共 关卓中|关 贯通两极法|贯 广闻|广 郭伯雄|郭 郭罗基|郭 郭平|郭 郭岩华|郭 国家安全|国 国家机密|国 国军|国 国贼|国 韩东方|韩

韩联潮|韩 汉奸|汉 何德普|何 何勇|何 河殇|河 红灯区|红 红色恐怖|红 宏法|宏 洪传|洪

洪吟|洪 洪哲胜|洪 洪志|洪 胡紧掏|胡 胡锦涛|胡 胡锦滔|胡 胡锦淘|胡 胡景涛|胡 胡平|胡 胡总书记|胡 护法|护 花花公子|花 华建敏|华 华通时事论坛|华 华夏文摘|华 华语世界

论坛|华 华岳时事论坛|华 黄慈萍|黄 黄祸|黄 黄菊|黄 黄菊|黄 黄翔|黄 回民暴动|回 悔过

书|悔 鸡毛信文汇|鸡 姬胜德|姬 积克馆|积 基督|基 贾庆林|贾 贾廷安|贾 贾育台|贾 建国

党|建 江 core|江 江八点|江 江流氓|江 江罗|江 江绵恒|江 江青|江 江戏子|江 江则民|江江泽慧|江 江泽民|江 江澤民|江 江贼|江 江贼民|江 江折民|江 江猪|江 江猪媳|江 江主

席|江 姜春云|姜 将则民|将 僵贼|僵 僵贼民|僵 疆独|疆 讲法|讲 酱猪媳|酱 交班|交 教养

院|教 接班|接 揭批书|揭 金尧如|金 锦涛|锦 禁看|禁 经文|经 开放杂志|开 看中国|看 抗

议|抗 邝锦文|邝 劳动教养所|劳 劳改|劳 劳教|劳 老江|老 老毛|老 老人政治|老 黎安友|黎 李长春|李 李大师|李 李登辉|李 李红痔|李 李宏志|李 李洪宽|李 李继耐|李 李兰菊|李李岚清|李 李老师|李 李录|李 李禄|李 李鹏|李 李瑞环|李 李少民|李 李淑娴|李 李旺阳|李 李文斌|李 李小朋|李 李小鹏|李 李月月鸟|李 李志绥|李 李总理|李 李总统|李 连胜德|连 联总|联 廉政大论坛|廉 炼功|炼 梁光烈|梁 梁擎墩|梁 两岸关系|两 两岸三地论坛|两

两个中国|两 两会|两 两会报道|两 两会新闻|两 廖锡龙|廖 林保华|林 林长盛|林 林樵清|林林慎立|林 凌锋|凌 刘宾深|刘 刘宾雁|刘 刘刚|刘 刘国凯|刘 刘华清|刘 刘俊国|刘 刘凯

中|刘 刘千石|刘 刘青|刘 刘山青|刘 刘士贤|刘 刘文胜|刘 刘晓波|刘 刘晓竹|刘 刘永川|刘 流亡|流 六四|六 龙虎豹|龙 陆委会|陆 吕京花|吕 吕秀莲|吕 抡功|抡 伦功|伦 轮大|轮轮功|轮 轮奸|轮 罗干|罗 罗礼诗|罗 马大维|马 马良骏|马 马三家|马 马时敏|马 卖国|卖毛厕洞|毛 毛片|毛 毛贼东|毛 美国参考|美 美国之音|美 蒙独|蒙 蒙古独立|蒙 密穴|密

绵恒|绵 民国|民 民进党|民 民联|民 民意|民 民意论坛|民 民运|民 民阵|民 民猪|民 民主

|民 民主墙|民 民族矛盾|民 明慧|明 莫伟强|莫 木犀地|木 木子论坛|木 南大自由论坛|南

闹事|闹 倪育贤|倪 你说我说论坛|你 潘国平|潘 泡沫经济|泡 迫害|迫 祁建|祁 齐墨|齐 钱

达|钱 钱国梁|钱 钱其琛|钱 抢粮记|抢 乔石|乔 亲美|亲 亲日|亲 钦本立|钦 秦晋|秦 青天

白日旗|青 轻舟快讯|轻 情妇|情 庆红|庆 全国两会|全 热比娅|热 热站政论网|热 人民报|人人民内情真相|人 人民真实|人 人民之声论坛|人 人权|人 忍|忍 日内瓦金融|日 瑞士金融

大学|瑞 色情|色 善恶有报|善 上海帮|上 上海孤儿院|上 邵家健|邵 射精|射 神通加持法|神沈彤|沈 升天|升 盛华仁|盛 盛雪|盛 师父|师 石戈|石 时代论坛|时 时事论坛|时 世界经

济导报|世 事实独立|事 双十节|双 水扁|水 税力|税 司马晋|司 司马璐|司 司徒华|司 斯诺

|斯 四川独立|四 宋 xx|宋 宋平|宋 宋书元|宋 宋祖英|宋 苏绍智|苏 苏晓康|苏 台独|台

台盟|台 台湾独立|台 台湾狗|台 台湾建国运动组织|台 台湾青年独立联盟|台 台湾政论区|台台湾自由联盟|台 太子党|太 汤光中|汤 唐柏桥|唐 唐捷|唐 滕文生|滕 天安门录影带|天

天安门事件|天 天安门屠杀|天 天安门一代|天 天怒|天 天葬|天 童屹|童 统独|统 统独论坛|统 统战|统 屠杀|屠 外交论坛|外 外交与方略|外 万润南|万 万维读者论坛|万 万晓东|万

汪岷|汪 王宝森|王 王炳章|王 王策|王 王超华|王 王丹|王 王辅臣|王 王刚|王 王涵万|王

王沪宁|王 王军涛|王 王力雄|王 王瑞林|王 王润生|王 王若望|王 王希哲|王 王秀丽|王 王

冶坪|王 网特|网 尉健行|尉 魏京生|魏 魏新生|魏 温家宝|温 温元凯|温 文革|文 无界浏览

器|无 吴百益|吴 吴邦国|吴 吴方城|吴 吴官正|吴 吴弘达|吴 吴宏达|吴 吴仁华|吴 吴学灿

|吴 吴学璨|吴 吾尔开希|吾 五不|五 伍凡|伍 西藏|西 西藏独立|西 洗脑|洗 下体|下 项怀

诚|项 项小吉|项 小参考|小 肖强|肖 邪恶|邪 谢长廷|谢 谢选骏|谢 谢中之|谢 辛灏年|辛

新观察论坛|新 新华举报|新 新华内情|新 新华通论坛|新 新疆独立|新 新生网|新 新闻封锁|新 新语丝|新 信用危机|信 邢铮|邢 熊炎|熊 熊焱|熊 修炼|修 徐邦秦|徐 徐才厚|徐 徐匡

迪|徐 徐水良|徐 许家屯|许 薛伟|薛 学潮|学 学联|学 学习班|学 学运|学 学自联|学 雪山

狮子|雪 严家其|严 严家祺|严 阎明复|阎 颜射|颜 央视内部晚会|央 杨怀安|杨 杨建利|杨

杨巍|杨 杨月清|杨 杨周|杨 姚月谦|姚 夜话紫禁城|夜 一中一台|一 义解|义 亦凡|亦 异见

人士|异 异议人士|异 易丹轩|易 易志熹|易 淫穴|淫 尹庆民|尹 由喜贵|由 游行|游 幼齿|幼 幼女|幼 于大海|于 于浩成|于 余英时|余 舆论|舆 舆论反制|舆 宇明网|宇 圆满|圆 远

志明|远 岳武|岳 在十月|在 则民|则 择民|择 泽民|泽 贼民|贼 曾培炎|曾 曾庆红|曾 张伯

笠|张 张钢|张 张宏堡|张 张健|张 张林|张 张万年|张 张伟国|张 张昭富|张 张志清|张 赵

海青|赵 赵南|赵 赵品潞|赵 赵晓微|赵 赵紫阳|赵 哲民|哲 真善忍|真 真相|真 真象|真 镇

压|镇 争鸣论坛|争 正见网|正 正义党论坛|正 郑义|&

Sniffer Packets & Firewalls 214

Appendix IV

Time Line

1998 Blondie Wong claims to have hacked into a Chinese satellite

1999 Cyber war between Taiwan and the Mainland

Websites in the USA attacked following the bombing of the Chinese Embassy in Belgrade.

2000 China is accused of hacking into Japanese government websites

2001 First Regulations to combat hacking introduced

2001 Cyber war between China and the USA following the spy plane incident

2002 White Paper on Defence released identifying information warfare and network security as an issue.

Falun Gong Hacks into television satellites

2003 Chinese government accused of hacking into the Dali Lama’s computer networks.

2004 The Indian Times reports on hack attacks by the Chinese on Tibetan exiles computers.

2005 USA Department of Defence computers under attack from emails containing Trojan Horses

China accused of hacking into

2006 China suspected of hacking into USA Navy site and Commerce Department

2007 China accused of hacking into military sites in the USA Germany the United Kingdom, France Australia, and New Zealand. China vehemently denies the accusations and claims that they are the victims of a large number of hack attacks.

Sniffer Packets & Firewalls 215

Appendix VII

Citizen Reporters On The Huankantou/Huaxi Incident

In the matter of the Huankantou/Huaxi incident, I had two previous posts. The post A New Chinese Tourist Mecca was an eyewitness account by a visitor a few days after the incident. The post Q&A about Huaxi/Huankantou is a collection of various pieces about the background as well as the event itself. This current post collects a number of Chinese Internet forum comments (via Boxun) translated into English. As such, you are reminded that there is no guarantee on accuracy, but this is an example of citizen reporters taking over when the mainstream media are missing in action.

The event took place on early April 10, and these posts occurred between April 12 and April 13. Thereafter, all Internet posts on the subject were deleted by the Internet Nanny. So this was a brief window of opportunity in which free exchange of information was permitted to occur. These posts are also interesting because they illustrate the interaction between government and citizenry in Undercover Internet Commentators on the Chinese Internet. Among the commentators were a couple of people who were present at the scene from the government side. You can read this fascinating exchange among the people, including both their perspectives as well as the tone and style of interaction. But just as we were getting both sides of the story, the rhetorical devices got in the way and communication was broken off. If the conversation had continued, there might have been a collaborative effort to ferret out whether two elderly ladies were really killed (note: some local person must know their names), why a government worker got the tendons in his legs severed with knives by the rioters in the customary manner of Chinese triad gangs (note: some local person must have seen it), and other details.

Like it or not, this was better than hearing from the government only through official press releases on one side and the citizens trying to outdo each other in bashing the government on the other side. In this case, the government workers were not the type who hoist the red flag high and sing praises of the leadership. I just wished the dialogue could have continued further along.

Eyewitness [4s4s4s4s123@sohu], April 12, 2005, 22:00.

Let me explain what happened on April 10th in detail.

At around 1am on April 10, I received a telephone call to assemble at 3am for an emergency meeting (it was Sunday, and I really didn’t want to go). At 4am, we assembled in front of the municipal government building and we boarded vehicles. Each vehicle had a number. If my memory serves me right, the last bus should be number 50.

At 430am, the vehicles entered the village. At around 5am, the militia set up a security cordon outside the bamboo sheds, and the workers from the various

Sniffer Packets & Firewalls 216

units (several dozens of them came from the Women’s League; they were women, and some of them were more than 50 years old) entered the bamboo sheds to persuade the elders to leave. After those people left, the workers from the municipal government began to dismantle the sheds.

At 530am, the dismantled material were loaded onto the vehicles, and the workers were ready to leave the scene. By this time, more and more spectators had shown up. There was a clash between the crowd and the police who were maintaining order on the road, and there were isolated instances of rock throwing at the police and the workers. The police and the militia used their bodies to erect a human wall, and the workers entered successfully into the school. During the clash, a small young man wearing glasses was dragged by the police into the group of workers. He was probably one of the more ‘excited’ local people, but the police did not do anything to him because they probably did not have time to worry about him.

When was it? I forgot. At the school sports field, we can hear waves and waves of shouting from the outside. I went up to the third floor of the classroom building. Heavens! There were a lot of people outside (actually, this was just the start and many more people would be coming). Two ambulances, a medium-sized bus and two lorries parked on the outside of the school were ready to leave. At the time, they had thought about there might be injured workers or people who cannot be persuaded to leave, so that was why they were parked outside.

When was it? I forgot. When the five vehicles got to the peasant houses nearest to the bamboo sheds, the crowd’s roar got louder and then bricks and rocks were thrown at the vehicles like a hailstorm. The sounds of the screaming bricks (in Dongyang, the locals are famous for throwing rocks; not only can they throw far, but they can actually throw with sound), the windows breaking and the people yelling were loud. The ambulance from the People’s Hospital was in the front, followed by the ambulance from the Chinese Medicine Hospital next, then the bus and the lorries.

When was it? I did not have time to look at my watch! The anti-riot police (actually, they were just formed from the ordinary police) was forced to fire off tear-gas canisters. A total of five canisters were released. I can see that clearly. (To the forum master, here I have to ask you, Do you know why they used only five canisters? And then they did not use any more even when the situation got out of control!? Let me tell you, the Public Security Bureau instructed their people very clearly before setting out -- if the people scream and curse you, you must not respond; if the people assault you, you must not hit back. Thus, they never expected the locals to be like this! Therefore, they only used five canisters, and even those five canisters had been borrowed. The batons and shields of the several dozens of anti-riot police were in fact the only weapons of self-defense for the more than 2,000 government workers). At that time, the crowds dispersed quickly. Some bold ones continued to throw rocks at the militia, and one person was arrested by the police. At that time, the vehicles were able to get through. During the process, there were some elders who tried to stop the vehicles, but a police station director persuaded them to make way. (I don’t want to give the details of the names, because I don’t want to cause them or me any problems. Please pardon).

As for what happened next, it was something that nobody wanted to see! To tell the truth, if was not so much shocking as terrifying. It let me see how "human qualities were trampled"!!!

Sniffer Packets & Firewalls 217

11678 [110011678_2002@sohu], April 12, 2005, 22:23

Let me tell you what you people did. Why were people throwing rocks? Because your vehicles rolled over elderly ladies and then you fired off tear gas canisters. That was why the people started to throw rocks. When you people were loading the vehicles, an innocent person was assaulted by your people and was seriously injured. Why won’t you say so? That was the paper factory boss near the small bridge, and he only came out to retrieve his dog. Is this not the truth? Would you care to say that this was not the truth?

Eyewitness [4s4s4s4s123@sohu], April 12, 2005, 22:28.

My mobile phone suddenly went off. A colleague who came with me told me not to watch anymore, but to come downstairs and get on the bus immediately. (At the time, I was so glad that I was not on one of those five vehicles. But the latter developments would show me how pitifully wrong I was). When I got on the bus, I told my colleagues about what I saw before. Then we heard the loud yelling from the school entrance, because the local villagers have begun to attack the school (afterwards, I found out that they were spreading rumors that the vehicles had killed some people). The anti-riot police stopped them repeatedly and then they also rushed outside (even now, I don’t understand why they wanted to rush outside). The anti-riot police were able to break out, but the ordinary police behind them could not get out. Therefore, the job of defending the entrance fell to them (because the anti-riot police did not come back). At that time, some injured personnel retreated towards the sports field in the school. Our group felt that the matter was taking a serious turn, and we got off the bus and retreatedtowards the classroom building. The developments would prove that our decision was correct.

Angry Fish [far17@sohu], April 12, 2005, 22:46.

The preceding is the "official version" that is closest to the truth. But if one has to use the "official tone" to speak to you, one might ask: "Can you produce the evidence for your version?" It is doubtful that you can produce that, because nobody thought that this matter would turn out this way, and even the Huaxi villagers did not think that it would turn out this way either.

On other points, there was a number 51 on a medium-sized bus parked on the road. As for your persuading the people to leave in order to take down the bamboo sheds, I think that your people worked too hard. There was an elderly lady whom you put on a bus and then she wanted to ram her head against the rail to commit suicide. I wonder how you persuade her to come out?

As for the clash near the peasant houses, it did not seem right. Someone was injured by you people in front of the paper factory. The few tear gas canisters did not matter. It was less than one hundred meters from the first peasant house to the road intersection, and basically there were no crowds after that.

Sniffer Packets & Firewalls 218

The anti-riot police did not appear to be ordinary police. The events that occurred afterwards were a human tragedy, but I don’t know if your people who took part reflected on it? Why did it turn out this way? Both sides trampled on each other’s human qualities, so please don’t use these saddening words.

Angry Fish [far17@sohu], April 12, 2005, 23:09.

Comrade Eyewitness, I want to clarify something with you. When you said that the forum master had bad intentions, I went back to read what had been posted. The forum master did not have anything that could be construed to be subjective speculation. Basically, the forum master reprinted what the media said about the environmental pollution! If you think that this is bad intentions, then it actually damages your credibility. I want to point this out, and if you think someone has bad intentions, you should be more specific. I think that you are basically a good comrade.

Fine, I am waiting for you to respond. Furthermore, the timing and the sequence of your events may be in some error, as I was also present at the scene. But the best way to understand this is to let the people know about what happened. We hope that more of those present can participate here, so that everyone (including the Huaxi villagers, the government officials, the police personnel and the government workers) can all understand the truth of this event.

Eyewitness [4s4s4s4s123@sohu], April 12, 2005, 22:28.

Do you want proof? Do you want it? What is your basis? Do you dare to get it? When two policemen who wanted to protect injured government workers were beaten into a pulp, what did you do? What did you do? What did you do? Are they humans? You want to look at the photos? Oh! You want to look at them? If you are a Dongyang person, you better speak to the facts -- the people who were beaten were Dongyang folks and the people who beat them were also Dongyang folks! You don’t think this is shameful enough?

I would like to speak to you politely, but you people don’t seem to have any shame. I have nothing to say. Let me say again, the old lady sat at the seat next to the door on the medium-sized bus. And the people on the bus were the middle-aged women from the Women’s League, and the reason why they were there was to look after the elderly people who had been brought onto the bus. If it were your mother on the bus, would she let an elderly lady commit suicide? Unless your mother wanted to go to jail! Did you actually see someone get beaten up in front of the paper factory? Ha! The tear gas canisters were supposed to disperse the crowd in the front of the first peasant house! Did you know which direction the wind was blowing that morning? Ha!

I even know the name of the comrade who removed the elderly people in front of the bus, so I obviously knew from whom the anti-riot police came! Ha!

Since you don’t want to let me speak, OK!

Sniffer Packets & Firewalls 219

Angry Fish [far17@sohu], April 12, 2005, 23:45.

I did not do anything. I only recorded some facts, and I am reflecting on why so many government workers were injured. But at the scene, not a single citizen --please pay attention, not a single citizen said on their behalf: Stop beating them. I was very saddened, because the government that I trusted has become "worse than the police of the Kuomintang." I heard that phrase at least three times from elder people and that is why I remembered it. Besides, I don’t have the awful habit of hating any police personnel.

11678 [110011678_2002@sohu], April 12, 2005, 23:54.

Eyewitness, you seemed to be getting emotional. I came to this forum to let people know about my thoughts and what I saw. Do you think that everyone is inhumane? Let me tell you, did you think that the injured people in there got out on their own? Damn you!!! We got them out. Have you thought about why things go to this stage?

Angry Fish [far17@sohu], April 12, 2005, 23:58.

On the last bit, I am just one person, and I can only believe what I saw. The villagers were running amok and they were emotional. You are just one person, and you can only present what you saw. But did you think about why they got so worked up? It is not enough to know the result of something, because it is necessary to figure out the reason why.

As Donyang people, it would seem too parochial to be concerned about saving face as opposed to figuring out the rights and wrongs. We are just plain folks, and we don’t want to worry about the problem of face because we are having a hard enough time staying alive. As for your tone of speech, I sensed that you must be in the police, because they usually speak like that. Why don’t I have the right to see the proof and the evidence? Please give me a reason. The constitution of the People’s Republic gave the citizens the right to know. You withhold the information because you are afraid that Dongyang will lose face, but that it is your tragedy. All rumors arise because of the lack of direct helpful information.

My anger came from the manner by which the government handled the pollution problems as well as the elderly protesters in their sit-down. As for the clash, I am sorry for both sides.

Eyewitness [4s4s4s4s123@sohu], April 13, 2005, 00:10

Ha ha ha. This is laughable! So a few police men and government workers were saved by the locals and hidden in their homes! You must be real locals. Ha ha. I forgot, even if the locals saved people, they don’t dare to admit it because some people will accuse them of being "traitors"!

Sniffer Packets & Firewalls 220

Those people were beaten to a pulp without sign of life. What did their assaulters do? I think the people who were at the scene surely knew! I won’t say anything, because I am a Dongyang person too.

So, please continue chatting. Just don’t remember who you are!

11678 [110011678_2002@sohu], April 13, 2005, 00:14.

We common folks are unable to formulate a conclusion about the rights and wrongs of this case. It is true that some criminal elements took advantage of the situation, such as robbing the stuff inside the vehicles. Some are from here and some are from the outside, and I am shamed of them. The incident was caused by the pollution, and the people could not even grow any vegetables and must therefore buy from the city (that was how it is with my family). Why did the government attempt to solve this only after it came to this point? Do the officials care about the livelihood of the people?

Yahoo 0410 [Yahoo -0401@sohu], April 13, 2005, 00:43.

My name is Wang, the Wang as in "Huankantou"! The entire incident took place about 500 to 600 meters from my house. On that night, I also heard the sound of the firecrackers (the signals used by the elderly people in the bamboo sheds when they see government workers coming to remove the bamboo sheds) and I witnessed the entire incident. Afterwards, I monitored what the reactions from everyone. Of course, I also paid attention to what people on the Internet are saying. The government has the newspapers and the broadcast channels. They have the means to speak, because these are their newspapers and broadcast channels! But I want to hear the voices of the people! I have seen all sorts of posts on many web sites, big and small. Originally, I did not want to express my own thoughts, because it is a waste of time since no important official is going to have the spare time to read forum posts and then decide to take action.

But I can’t stand it and I must speak out.

It is easy to see what went on, because it is not as if this sort of thing hasn’t happened before. This was a human drama, with all sorts of people -- there are politicians, there are clowns, there are thugs, there are those who gloat, there are those who pound their chests, there are those are scared ... and these days, there are large groups of tourists (most people have never seen so many cars being smashed)! I want to say -- it is we the common folks who have suffered!

How did things come to this point? The leaders don’t have the time now to clean up the battlefield, so everybody gets to come and see it! The leaders are busy with other things! Like sending a fax to Reuters and saying that the truth is something else ... actually it was due to a "small number of people with malicious intent" ... actually ... I am not interested in what happens to these leaders and their political future is something only they care about! I want to know what we common folks should do? There are a lot and a lot of people who will be "severely sanctioned" for "opposing" (the government document actually contains these words, and you can verify it for yourself). And we have to endure the stinking water and the polluted air day and night, we have to watch the bosses

Sniffer Packets & Firewalls 221

pass in front of us in their BMWs and then we receive less than a hundred dollars in compensation money each year (I received 80 yuan this New Year).

Fine, everybody must think that I am going off the track. So let me tell you what I saw on that day. Earlier on March 20, the local people heard that a chemical industrial plant was moving here. Everybody was quite angry, and a number of elderly people began to built the bamboo sheds to obstruct the principal access road to the chemical plant. Eventually, more and more people took part, so that there were more than a dozen of those sheds. By early April, the government issued a notice to ask the people to remove the sheds. Honestly, the government’s first notice was quite rational, saying a lot of nice things. But maybe the people don’t believe this sort of talk anymore, or because some city leaders refused to give up, or maybe it is both. So the government leaders could not wait anymore and they issued the second letter from the town government, including a notice from the public security bureau. The tone of that letter was scary. I called that "white terror." A few days afterwards, on April 10, a major incident accidentally but inevitably occurred.

When I got to the scene, the leader’s car had already left. At the time, the people on the road said that government vehicles rolled over and killed two elderly women; they also said that a civil government vehicle rolled over and killed one person and then they threw another injured person onto the car to be cremated alive! My first feeling was that this was extremely unlikely. When I got to about 300 meters from the bamboo sheds, I saw a topless man who was bleeding in the head running in the field being chased by a dozen peasants, one of whom was holding a stick and hitting the man. As I went further down to about 50 meters from the school, I saw a young man lying motionless in a pool of blood. He was dressed in what appeared to be a government worker uniform, and there was a pool of blood behind his head. I wanted to assist him, but the crowd around him would not let me do that.

My heartbeat rose as I went further ahead. When I got to the school, I saw that the wall was breached in two spots. Inside the schoolyard, there were many vehicles of various sizes, some of which had been smashed. The size of the crowd at the scene was so large as to be impossible to estimate. I heard that there were still some "police" trapped inside. After a few minutes, I squeezed my way towards the classrooms. There were a few people in uniform lying motionless on the ground. Someone was yelling, "Tong Rong told you to come here to die, and you came here to die!" I could not endure the angry atmosphere and I withdrew.

That was what I personally saw. No lies here. I describe these bloody scene not to let the government off. I would like to ask the city officials if they should bear some responsibility? Why did you let some unconnected people who don’t know the facts come here to do who knows what? Did you consider the safety of the people? If you asked the militia "not to fight back when hit," did you consider the safety of the militia themselves? Did you think that if you show up with 3,000 people, then the people will be intimidated? Did you not realize that there was the anger penned up over so many years? Did you feel that everything can be sacrificed for your own interests?

Perhaps a "small number of persons with malicious intent" were spreading rumors, but this is just a political struggle between you and them. Why should so many other people play along with you? Why don’t you do it properly, why don’t you do it the people’s way and why don’t you do it in a way that calms the people

Sniffer Packets & Firewalls 222

instead of falling right into the trap of the "persons with malicious intent"? Sad! Disgusting! Detestable!

Yahoo 0410 [Yahoo -0401@sohu], April 13, 2005, 01:24.

To "Eyewitness" and "Real Words Are Precious":

I am a Huaxi person. I have lived here for many years. I know more about Huaxi than you do, I know more about the local people and I know even more about the government that you do.

I cannot help but start guessing at your identities. There are only several types of people here. One type would be those who are intimately connected with the incident, such as myself. Another type would be those passed by and made some posts. And then there is another type which is definitely on the other side of this incident -- such as the two of you. I think that maybe you are uniformed people who were asked by the leadership to take part in this illegal and unreasonable event, and so I can understand why you would want to complain. But you should remember that this was not the fault of the common folks, because they were forced into this. Do you want them to be just like you, being pawns on a chessboard? If you want to blame someone, you should find those who brought you over there in the first place! If you are just the usual government workers like the reporters at the Dongyang Daily, then I despise you strongly because you are worst than beasts.

The Third Eye Looks at 123 [zjdy_5678@sohu], April 13, 2005, 09:10.

Based upon I found out last night, the Dongyang municipal government mobilized three ambulances and two morgue hearses in case the workers or the common folks should need them.

This morning, an office colleague told me that her relative is a cadre and many Dongyang City department heads did not want to be used by Secretary Tong Rong and so they either turned off their mobile telephones or found some other excuse not to go. They did not want to get involved.

lijpsy [lijpsy@sohu], April 13, 14:46.

I send my respects to the comrades who were injured in this incident! Most of you were encouraged to take part without knowing the truth, and most of you behaved well -- except for a few who wanted to show off in front of the leaders! I believe that in the handling of such internal conflicts within the people, if the leaders had the courage to show up by themselves to persuade the people on the basis of legal and rational arguments, then the tragedy would not have taken place. The matter has not ended. If I were the instigator, I would have killed myself to apologize to all those who were physically and psychologically damaged, including those cadres and militia who broke down and cried afterwards as well as those students who are not able to attend classes these days.

Sniffer Packets & Firewalls 223

When the people act as a group, they cannot be ignored or under-estimated! The leaders should not think that they can be mistreated, because even their tolerance has limits. The Dongyang leadership should think about whether they ought to feel guilty over this matter. Imagine that your home is in Huankantou and you have no means to redress your pollution problems, would you not feel that justice does not exist in the world?

Comrades, let me make you a suggestion! Locking down the media is not the solution. You ought to resolve the matter as quickly as possible, and you must publicly and honestly tell the public about the situation. You should tell all the media about the objective truth, you must bring all the leaders who were involved in criminal activities to justice, and you must stop operations in all those factories which exceed pollution standards. At the same time, you must also punish those people who used the opportunity to create chaos -- but not including those people who took part because they genuinely thought that they were fighting for their interests. Otherwise, the event will get more distorted as it gets relayed and you are going to look worse and worse off. You should not think that after blocking the other media, your own Dongyang Daily will help you -- after a few days, you may be the only people left reading it.

Please believe that most of the villagers are good people, and there are not too many people who took part without knowing what was going on. The anger of the people showed one thing -- there is no hatred that came about for no reason! Think about this and shouldn’t this simple fact be understood by the graduates of the communist party school?

I hope that this matter does not end with April 10. I will pray for all those who have an interest in this matter, including the leader who issued the order!

huashui050410 [huashui050410@sohu], April 13, 16:02.

Today is the third day after the Huaxi incident. Due to the information blockade, various visitors have come from all directions to see what is going on. All traffic into Huaxi has been blocked off by traffic police. Is the government getting nervous or what!? Why are all the web sites deleting the related posts? This is extremely infuriating!

http://zonaeuropa.com/20050524_1.htm